Skip to main content
USQ Logo
The current and official versions of the course specifications are available on the web at
Please consult the web for updates that may occur during the year.

CIS2005 Principles of Information Security

Semester 2, 2019 On-campus Springfield
Short Description: Principles of Info Security
Units : 1
Faculty or Section : Faculty of Business, Education, Law and Arts
School or Department : School of Management and Enterprise
Student contribution band : Band 2
ASCED code : 029901 - Security Science
Grading basis : Graded


Examiner: Michael Lane

Other requisites

Students are required to have access to a personal computer, e-mail capabilities and Internet access to UConnect. Current details of computer requirements can be found at


Students entering the Information Communications and Technology profession need to develop a good understanding of the importance of information security for organisations and society. Students must have a good working knowledge of the role of information security in providing an appropriate level of confidentiality, integrity and availability while considering the legal, privacy and ethical implications. Students need to develop the knowledge and skills while using a range of security technologies and tools to identify potential threats and vulnerabilities that may exist in business systems and networks and manage security architecture and design and the associated risks and legal, privacy and ethical issues that may rise. This course provides students with an intermediate knowledge of the key principles necessary for managing the security of business information systems and networks.


Students study contemporary information security theory and practice in the context of threats, attacks and vulnerabilities that may exist in business systems and networks and the security controls that can be put in place to ensure that the risks are managed at an acceptable level. Students will develop their skills and knowledge so that they can evaluate information security situations. They will be able to identify specific threats, attacks, vulnerabilities, and manage security architecture and design legal, privacy or ethical issues that may arise. They will be able to clearly communicate and propose recommendations to manage the risks. Students will be assessed on their understanding of key concepts of information security and their ability to apply and communicate effectively contemporary information security theory and practice to real world problems in the assignments and the final examination.


On successful completion of this course, students should be able to:

  1. analyse information security threats, attacks and vulnerabilities and determine appropriate security architecture, design and controls that can be applied to mitigate the potential risks
  2. describe the role of disaster recovery and business continuity plans in recovering information and operational systems when systems and hardware fail
  3. describe why legal privacy and ethical issues play an important part in effectively managing information security
  4. communicate effectively written and orally about the management of information security in organisations.


Description Weighting(%)
1. Threats, attacks and vulnerabilities 21.00
2. Security technologies and tools 18.00
3. Security architecture and design 21.00
4. Identity and access management 16.00
5. Risk management 13.00
6. Cryptography and public key encryption. 11.00

Text and materials required to be purchased or accessed

ALL textbooks and materials available to be purchased can be sourced from USQ's Online Bookshop (unless otherwise stated). (

Please contact us for alternative purchase options from USQ Bookshop. (

Conklin, WMA & White, G 2018, Principles of computer security: CompTIA security+ and beyond (exam SY0-501), 5th edn, McGraw-Hill, New York.
(includes CD.)
All students will need access to a PC word processing and spreadsheet package. Any package will suffice.
Students also need MS Windows to view multimedia materials.

Reference materials

Reference materials are materials that, if accessed by students, may improve their knowledge and understanding of the material in the course and enrich their learning experience.
Cheswick, WR, Bellovin, SM & Rubin, AD 2003, Firewalls and Internet security: repelling the wily hacker, 2nd edn, Addison-Wesley, Boston, Massachusetts.
Pfleeger, CP & Pfleeger, SL 2015, Security in computing, 5th edn, Prentice Hall, Upper Saddle River, New Jersey.
Stewart, J 2017, CompTIA Security+ review guide: exam SY0-501, 4th edn, John Wiley, Indianapolis, Indiana.
Whitman, M & Mattford, H 2017, Principles of information security, 6th edn, Course Technology, Boston, Massachusetts.

Student workload expectations

Activity Hours
Directed Study 52.00
Independent Study 113.00

Assessment details

Description Marks out of Wtg (%) Due Date Notes
ASST 1 - ONLINE QUIZ 100 5 05 Aug 2019
ASST 2 - WRITTEN REPORT 100 15 30 Aug 2019
ASST 3 - CASE STUDY REPORT 100 30 14 Oct 2019
EXAMINATION 100 50 End S2 (see Examination notes below)

Description Marks out of Wtg (%) Notes
EXAM PART A - MULTIPLE CHOICE 30 15 (see exam note 1)

Exam Notes
  1. This is a restricted examination. The total working time for the examination (parts A and B) is 2 hours. The examination date will be available via UConnect when the official examination timetable has been released.

Important assessment information

  1. Attendance requirements:
    Online: There are no attendance requirements for this course. However, it is the students' responsibility to study all material provided to them or required to be accessed by them to maximise their chance of meeting the objectives of the course and to be informed of course-related activities and administration.

    On-campus: It is the students' responsibility to attend and participate appropriately in all activities (such as lectures, tutorials, laboratories and practical work) scheduled for them, and to study all material provided to them or required to be accessed by them to maximise their chance of meeting the objectives of the course and to be informed of course-related activities and administration.

  2. Requirements for students to complete each assessment item satisfactorily:
    To satisfactorily complete an individual assessment item a student must achieve at least 50% of the marks. (Depending upon the requirements in Statement 4 below, students may not have to satisfactorily complete each assessment item to receive a passing grade in this course.)

  3. Penalties for late submission of required work:
    Students should refer to the Assessment Procedure (point 4.2.4)

  4. Requirements for student to be awarded a passing grade in the course:
    To be assured of receiving a passing grade a student must achieve at least 50% of the total weighted marks available for the course.

  5. Method used to combine assessment results to attain final grade:
    The final grades for students will be assigned on the basis of the aggregate of the weighted marks obtained for each of the summative assessment items in the course.

  6. Examination information:
    This is a restricted examination. The only materials that candidates may use in the examination for this course are:
    1. writing materials. These must be non-electronic and free from material which could give the student an unfair advantage in the examination.
    2. an unmarked non-electronic translation dictionary (but not technical dictionary). A student whose first language is not English may take a translation dictionary into the examination room. A translation dictionary with any handwritten notes will not be permitted. Translation dictionaries will be subject to perusal and may be removed from the candidate's possession until appropriate disciplinary action is completed if found to contain material that could give the candidate an unfair advantage.

  7. Examination period when Deferred/Supplementary examinations will be held:
    Any Deferred or Supplementary examinations for this course will be held during the next examination period.

  8. University Student Policies:
    Students should read the USQ policies: Definitions, Assessment and Student Academic Misconduct to avoid actions which might contravene University policies and practices. These policies can be found at

Assessment notes

  1. Referencing in assignments:
    Harvard (AGPS) is the referencing system required in this course. Students should use Harvard (AGPS) style in their assignments to format details of the information sources they have cited in their work. The Harvard (AGPS) style to be used is defined by the USQ Library's referencing guide at