Information Security (11759.1)
Available teaching periods | Delivery mode | Location |
---|---|---|
View teaching periods | On-campus |
Bruce, Canberra |
EFTSL | Credit points | Faculty |
0.125 | 3 | Faculty Of Science And Technology |
Discipline | Study level | HECS Bands |
Academic Program Area - Technology | Level 3 - Undergraduate Advanced Unit | Band 2 2021 (Commenced After 1 Jan 2021) Band 3 2021 (Commenced Before 1 Jan 2021) |
This unit may be cotaught with 6682 Information Security PG.
Learning outcomes
On successful completion of this unit, students will be able to:1. Interpret and integrate organisational security practices;
2. Analyse information security risks in personal and organisational situations and prepare appropriate reports for specific and non-specific audiences; and
3. Synthesise knowledge and skills to design information security requirements.
Graduate attributes
1. UC graduates are professional - communicate effectively1. UC graduates are professional - display initiative and drive, and use their organisation skills to plan and manage their workload
1. UC graduates are professional - employ up-to-date and relevant knowledge and skills
1. UC graduates are professional - take pride in their professional and personal integrity
1. UC graduates are professional - use creativity, critical thinking, analysis and research skills to solve theoretical and real-world problems
2. UC graduates are global citizens - behave ethically and sustainably in their professional and personal lives
2. UC graduates are global citizens - make creative use of technology in their learning and professional lives
3. UC graduates are lifelong learners - adapt to complexity, ambiguity and change by being flexible and keen to engage with new ideas
3. UC graduates are lifelong learners - evaluate and adopt new technology
3. UC graduates are lifelong learners - reflect on their own practice, updating and adapting their knowledge and skills for continual professional and academic development
Prerequisites
Must have passed 39 credit points including 11486 Systems Analysis and Modelling.Corequisites
None.Incompatible units
6682 Information Security PGEquivalent units
7162 Information Security, 11487 Information SecurityAssumed knowledge
None.Year | Location | Teaching period | Teaching start date | Delivery mode | Unit convener |
---|---|---|---|---|---|
2024 | Bruce, Canberra | Semester 1 | 05 February 2024 | On-campus | Dr Abu Barkat Ullah |
2025 | Bruce, Canberra | Semester 1 | 03 February 2025 | On-campus | Dr Abu Barkat Ullah |
Required texts
There is no required textbook for Information Security.
The following books are set as recommended readings:
-
ISACA (2019), COBIT 2019, ISACA
-
ISO27000 series – Information technology — Security techniques — Information security management systems
-
Whitman, ME & Mattord, HJ (2019), Management of information security, 6th edn, Cengage Learning
-
Awad, A & Fairhurst, M. (2018), Information Security : Foundations, Technologies and Applications, Institution of Engineering & Technology
-
Chopra, A & Chaudhary (2019) Implementing an Information Security Management System : Security Management Based on ISO 27001 Guidelines, Apress L. P.
-
Vacca, J and Vacca, J (2013) Computer and Information Security Handbook, Elsevier Science & Technology
-
Chapple, M (2021), CISM Certified Information Security Manager Study Guide.John Wiley & Sons
A range of academic articles relating to Information Security will also be used to support the teaching of this unit.
Submission of assessment items
Extensions & Late submissions
Students should keep a copy of all assessment items that are submitted at least until unit grades have been published at the end of semester.
Special assessment requirements
In order to pass this unit, students have to obtain total marks of 50% or greater. Some scaling of marks and academic judgement may be applied to determine students' final grades - in this process no student will be disadvantaged.In the case of any assignment that places you in jeopardy of a Fail in the whole unit, appropriate moderation procedures will be used.If there is any doubt with regard to the requirements of any particular assignments or assessment procedure, the onus for clarifying the issue rests with the student, who should contact the unit convener about the matter.
All work quoted from any source should be appropriately referenced using the "Harvard (2021)" referencing style as described in the link below (note that there is multiple versions of the Harvard referencing style, and you should use the one described here).
Students who are not familiar with referencing academic work should undertake the Academic Integrity Module.
The unit convenor reserves the right to question students on any of their submitted work for moderation and academic integrity purposes, which may result in an adjustment to the marks awarded for a specific task.
Students must apply academic integrity in their learning and research activities at UC. This includes submitting authentic and original work for assessments and properly acknowledging any sources used.
Academic integrity involves the ethical, honest and responsible use, creation and sharing of information. It is critical to the quality of higher education. Our academic integrity values are honesty, trust, fairness, respect, responsibility and courage.
UC students have to complete the annually to learn about academic integrity and to understand the consequences of academic integrity breaches (or academic misconduct).
UC uses various strategies and systems, including detection software, to identify potential breaches of academic integrity. Suspected breaches may be investigated, and action can be taken when misconduct is found to have occurred.
Information is provided in the Academic Integrity Policy, Academic Integrity Procedure, and Â鶹´å of Canberra (Student Conduct) Rules 2023. For further advice, visit Study Skills.
Learner engagement
Activities | Hours |
Weekly lecture: 2 hours per week, 12 weeks | 24 |
Weekly Tutorial: 1 hour per week, 11 weeks | 11 |
Preparation for tutorial work and other general reading: 3 hours per week, 11 weeks | 33 |
Tutorial work and online discussions | 22 |
Security evaluation Assessment | 40 |
Final Assessment | 20 |
Total | 150 |
Participation requirements
Attendance at classes is not compulsory but it is advisable for students to attend as many classes as possible. Students should also be aware that the subject will be examined on material covered in classes, including lectures and tutorials and it is the individual student's responsibility to ensure that they are sufficiently familiar with this material. Attendance at classes is one of the best ways of ensuring this familiarity. Do not make the mistake of assuming that the materials provided online perfectly substitute for class attendance.
Announcements are made throughout the unit, typically to clarify requirements for assignments. Any such announcements will be made using your student email account and/or placed on the unit web site. Such announcements are deemed, within two working days, to be made to the whole group. Announcements made at an organised session are deemed to be made to the whole group.
Required IT skills
Information Security is an advanced level unit and it is generally expected that students will have a fair degree of sophistication in their knowledge of IT related matters. Students should also possess the ability to use a word processor for the production of assignments and various on-line searching tools from the Internet and the library to undertake various assignments in the unit.
Work placement, internships or practicums
None