|Year of offer||2017|
|Subject level||Undergraduate Level 3|
|Fees||Subject EFTSL, Level, Discipline & Census Date|
Information is a valuable asset that requires protection from increasingly sophisticated and complex security threats. Given the ease with which information can be collected directly from individuals or secretly through technologies presents new challenges for protecting privacy.
An effective security strategy requires a sophisticated understanding of risk management and how a range of tools and techniques can be applied for protective purposes.
In this subject students will be exposed to a range of issues related to information privacy and security. These issues drive the need for better security tools, technologies and techniques. Students will learn foundational concepts that explain how security strategy is developed. Topics include: the security threat landscape, managing security risk exposure, protective paradigms, models and frameworks, and cryptographic techniques to secure information.
For Bachelor of Science students this is a required subject in the Informatics major and an elective subject in the Science Informatics major and the concurrent Diploma in Informatics. This subject is available as a breadth subject for other Bachelor degrees and is an elective in the Working with Information breadth track.
- Understanding the three Security Principles: Confidentiality, Integrity and Availability (C,I,A)
- Understanding how to conduct a Security Risk Assessment
- Developing a Security Strategy using Paradigms, Models and Frameworks
- Identifying security and privacy issues that drive the need for security
- Understanding cryptographic technologies and how they can be applied to security and privacy problems
Intended learning outcomes
Intended Learning Outcomes (ILOs)
On completion of this subject the student is expected to:
- Identify a range of security and privacy issues and threats that drive the need for security
- Understand the three security principles Confidentiality, Integrity and Availability (C,I,A) and how they relate to security threats and technologies
- Identify a range of security paradigms and models and understand how they can be deployed in a security strategy to protect information and preserve privacy
- Understand cryptographic technologies and how they can be deployed to protect information and preserve privacy
On completion of this subject, students should have developed the following generic skills:
- An ability to synthesise information and communicate results effectively
- An ability to work effectively as a member of a project team
- In-depth critical and independent thinking and reflection skills
- An ability to solve problems and communicate solutions both orally and in writing.