Principles of Information Security
Toowoomba , Australia
Visit Program Website
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Fully Online
Duration
Not Available
Details
Program Details
Degree
Courses
Major
Cybersecurity | Network Security
Area of study
Information and Communication Technologies | Security Services
Education type
Fully Online
Course Language
English
Intakes
| Program start date | Application deadline |
| 2023-07-01 | - |
About Program
Program Overview
Course Specification
The current and official versions of the course specifications are available on the web.
CIS2005 Principles of Information Security
Overview
Students entering the Information Communications and Technology profession need to develop a good understanding of the importance of information security for organisations and society. Students must have a good working knowledge of the role of information security in providing an appropriate level of confidentiality, integrity, and availability while considering the legal, privacy, and ethical implications.
Staffing
- Course Coordinator: Michael Lane
Course Details
- Units: 1
- School or Department: School of Business
- Grading basis: Graded
- Course fee schedule: Not specified
Course Learning Outcomes
On successful completion of this course, students should be able to:
- Analyse information security threats, attacks, and vulnerabilities and determine appropriate security architecture, design, and controls that can be applied to mitigate the potential risks.
- Describe the role of disaster recovery and business continuity plans in recovering information and operational systems when systems and hardware fail.
- Describe why legal, privacy, and ethical issues play an important part in effectively managing information security.
- Communicate effectively, both written and orally, about the management of information security in organisations.
Topics
| Description | Weighting(%) |
|---|---|
| 1. Threats, attacks, and vulnerabilities | 20.00 |
| 2. Legal, Ethical, and Privacy Issues | 5.00 |
| 3. Security technologies and tools | 16.00 |
| 4. Security architecture and design | 20.00 |
| 5. Identity and access management | 15.00 |
| 6. Risk management | 13.00 |
| 7. Cryptography and public key encryption | 11.00 |
Text and Materials Required
- Conklin, WMA & White, G 2018, Principles of computer security: CompTIA security+ and beyond (exam SY0-501), 5th edn, McGraw-Hill, New York.
- Access to a PC with word processing and spreadsheet package.
- MS Windows to view multimedia materials.
Student Workload Expectations
To do well in this subject, students are expected to commit approximately 10 hours per week, including class contact hours, independent study, and all assessment tasks.
Assessment Details
| Approach | Type | Description | Group | Assessment Weighting (%) | Course Learning Outcomes |
|---|---|---|---|---|---|
| Assignments | Written | Quiz 1 | No | 10 | 1 |
| Assignments | Oral | Presentation (ind, grp, mltmd) | No | 30 | 3,4 |
| Assignments | Written | Case Study | No | 40 | 1,2,4 |
| Assignments | Written | Quiz 2 | No | 20 | 2,3 |
See More
