|Semester 1, 2021 On-campus Toowoomba|
|Short Description:||Cyber Security Architecture|
|Faculty or Section :||Faculty of Health, Engineering and Sciences|
|School or Department :||School of Sciences|
|Student contribution band :||Band 2|
|ASCED code :||020399 - Information Systems not elsewh|
|Grading basis :||Graded|
Examiner: Ron Addie
The heavy dependence that our economic and government structures have on cyber infrastructure makes them more likely to cyber attack and poses potential threats to infrastructural assets. As cyber threats are becoming more prevalent, so does the need to neutralise them. This course provides students with the fundamentals of cyber security including an over view of the current cyber landscapes, procedures and techniques used and emerging trends.
This course gives students key information regarding the design and management of ICT security within an organisation. Students will consider the fundamental nature of cyber security including protocols to maintain system integrity. The course explores the critical objectives of ICT security, relevant processes and practices and the level of success in achieving these objectives within Australia and world-wide.
On successful completion of this course students should be able to:
- Analyse the key security objectives of an organisation.
- Provide a detailed explanation of the key security practices currently employed within an organisation, including the strengths and limitations of current cyber-security architecture practice and make recommendations to improve security based on emerging trends.
- Evaluate and compare the current cyber-security architecture landscape in Australia and other countries, cognisant of its importance, scale and impact.
- Define and give a detailed explanation of the range, objectives and techniques employed to undermine cyber security.
- Explore important examples where cyber-security is of critical importance and careful implementation of security practises aims to guarantee the integrity of key systems.
- Analyse the consequences of a cyber-security failure including the impact on stakeholders and the importance of a thorough investigation in order to improve future practices and protocols.
- Explain the special role of money in relation to information security management, and the consequences of this special role for cyber-security.
|1.||Analysis of organisational key security objectives||15.00|
|2.||Methods and procedures for achieving security objectives||15.00|
|3.||Current cyber-security practise in Australia and world-wide||15.00|
|4.||Several examples of key objectives, practices designed to achieve them, and the record of their success are then considered: (I) web-service security, with particular emphasis on the use of certificates to guarantee integrity and authentication and encryption to enforce key cyber-security objectives; (ii) authentication: its role, implementation, and consequences of failure; (iii) privacy of user information; (iv) the management and risks of privileged access; (v) a server farm.||20.00|
|5.||Understanding the enemy: who are the parties seeking to compromise security, what are their objectives? And how do they seek to achieve them?||15.00|
|6.||The special role of money in cyber-security, and how financial transactions need to be managed to minimize the risk of fraud.||10.00|
|7.||Cyber-security failure: both the importance of avoiding it, and how to manage failures when they occur.||10.00|
Text and materials required to be purchased or accessed
ALL textbooks and materials available to be purchased can be sourced from USQ's Online Bookshop (unless otherwise stated). (https://omnia.usq.edu.au/textbooks/?year=2021&sem=01&subject1=CSC8100)
Please contact us for alternative purchase options from USQ Bookshop. (https://omnia.usq.edu.au/info/contact/)
Student workload expectations
|Description||Marks out of||Wtg (%)||Due Date||Objectives Assessed||Notes|
|Assignment 1||100||20||12 Mar 2021||1,2,3||(see note 1)|
|Assignment 2||100||20||09 Apr 2021||1,2,3,4,5||(see note 2)|
|Assignment 3||100||20||30 Apr 2021||1,2,3,4,5,6,7||(see note 3)|
|Open Exam - Online||100||40||End S1||1,2,3,4,5,6,7||(see note 4)|
- An example organisation will be analysed, and a report produced, including an analysis of its key stakeholders, the rules that must apply, for their participation, and a preliminary plan for how this can be achieved.
- A series of real-world examples are considered and analysed from the point of view of the methodology learnt up to now. Recommendations for cyber-security practices are to be provided.
- A scenario in which an organisation is successfully attacked is explored. A report is prepared which explains how to respond to the attack. The example considered includes financial misappropriation.
- This will be an online exam. Students will be provided further instruction regarding the exam by their course examiner via StudyDesk. The examination date will be available via UConnect when the Alternate Assessment Schedule has been released.
Important assessment information
It is the students' responsibility to attend and participate appropriately in all activities scheduled for them, and to study all material provided to them or required to be accessed by them, to maximise their chance of meeting the objectives of the course and to be informed of course-related activities and administration.
Requirements for students to complete each assessment item satisfactorily:
To satisfactorily complete an individual assessment item a student must achieve at least 50% of the marks for that item.
Penalties for late submission of required work:
Students should refer to the Assessment Procedure http://policy.usq.edu.au/documents.php?id=14749PL (point 4.2.4)
Requirements for student to be awarded a passing grade in the course:
Due to COVID-19 the requirements for S1 2021 are:
To be assured of receiving a passing grade a student must achieve at least 50% of the total weighted marks available for the course.
Requirements after S1 2021:
To be assured of receiving a passing grade a student must obtain at least 50% of the total weighted marks available for the course (i.e. the Primary Hurdle).
Method used to combine assessment results to attain final grade:
The final grades for students will be assigned on the basis of the aggregate of the weighted marks obtained for each of the summative items for the course.
Due to COVID-19 the requirements for S1 2021 are:
An Open Examination is one in which candidates may have access to any printed or written material and a calculator during the examination.
Requirements after S1 2021:
RESTRICTED: Candidates are allowed access only to specific materials during a Restricted Examination. The only materials that candidates may use in the restricted examination for this course are:
• writing materials (non-electronic and free from material which could give the student an unfair advantage in the examination);
• calculators which cannot hold textual information
• Students whose first language is not English, may, take an appropriate unmarked non electronic translation dictionary (but not technical dictionary) into the examination.
• Dictionaries with any handwritten notes will not be permitted. Translation dictionaries will be subject to perusal and may be removed from the candidate’s possession until appropriate disciplinary
Examination period when Deferred/Supplementary examinations will be held:
Normally Deferred and Supplementary Examinations are held in the next Examination period. In S1 2021 selected courses will pilot an early Deferred and Supplementary Examination period held within 30 business days of results release. The list of courses involved can be found at https://cmsauth.usq.edu.au/current-students/academic/exams/supplementary-and-deferred-assessment.
University Student Policies:
Students should read the USQ policies: Definitions, Assessment and Student Academic Misconduct to avoid actions which might contravene University policies and practices. These policies can be found at http://policy.usq.edu.au.
Referencing in assignments must comply with the Harvard (AGPS) referencing system. This system should be used by students to format details of the information sources they have cited in their work. The Harvard (APGS) style to be used is defined by the USQ library’s referencing guide. This guide can be found at http://www.usq.edu.au/library/referencing.