|
Module Availability |
Semester 2 |
|
|
Assessment Pattern |
Assessment Pattern
Unit(s) of Assessment
|
Weighting Towards Module Mark( %)
|
Coursework (via projects)
|
|
Project Report (Individual)
|
40%
|
Project Poster Presentation (Group)
|
20%
|
Project Oral Presentation (Group)
|
20%
|
Lecture Weekly Summary (Individual)
|
20%
|
Qualifying Condition(s)
A weighted aggregate mark of 50% is required to pass the module
|
|
|
|
Module Overview |
The field of Information security has continued to grow rapidly in the past few years. Cyber-crime and terrorism activities have spurred on many new research fields and activities in information security, particularly for applications in the commerce, government and defence sectors. These have resulted in many innovative developments and solutions to address some of the problems and issues related to security for software and systems. Unfortunately new innovations and technologies have also brought along a new set of security concerns and problems, for example, such as security loopholes and attacks that are frequently associated with common operating systems, databases and networks.
This module will be presented by security experts from government and industry to provide the students with knowledge and their perspective on the latest innovation and technologies, as well as problems and concerns associated with information security systems. These lectures will include relevant topics such as security issues with business and government IT systems, developer concerns, information assurance and risk management, and information sharing. |
|
|
Prerequisites/Co-requisites |
Attendance of Lectures is compulsory and weekly sign-up will be registered. |
|
|
Module Aims |
This module will provide the students with a comprehensive insight into the latest technological solutions, applications, problems and concerns related to information security. It will consist of a series of lectures presented by security experts from government and industry. These lectures will include relevant topics such as security issues with business and government IT systems, system architecture, developer concerns, information assurance and risk management, and information sharing.
There will be coursework and assessment via group projects involved to provide the students some hands-on knowledge and experience from industrial experts on the latest technologies and applications, problems and concerns related to information and multimedia security. |
|
|
Learning Outcomes |
By the end of the module, students should be able to:
- Contrast and evaluate the latest innovations and technologies in information security
- Recognise the benefits, concerns and problems associated with computer and IT security systems
Describe and design relevant functions within a security platform/system based on topics covered by industrial experts |
|
|
Module Content |
The module content will include the following areas:
- Business IT security and developer issues
- Risk Management and information assurance practices
- Security and concerns in information sharing
- Security in system architecture
|
|
|
Methods of Teaching/Learning |
30 contact hours in weeks 1-10, consisting of:
- 20 hours of lecture and example classes (up to 9 industrial and government experts)
- 10 hours of coursework working on a group project related to a selected security area from the expert lectures. The coursework will be assessed as follows:
- Individual report (5000 words) of randomly selected theme from expert lectures with literature survey, in-depth interpretation and analysis (40%)
- Group poster presentation (20%)
- Group oral presentation (20%)
- Lecture Weekly Summary (20%)
For group poster and oral presentation, assessment will be performed by the module coordinator and industrial experts |
|
|
Selected Texts/Journals |
Essential Reading:
None
Recommended Reading:
Pfleeger, C. & Pfleeger, S. (2006), Security in Computing, fourth Edition, Prentice Hall, ISBN-13: 9780132390774
Notes and references from industrial experts
Supplementary Reading:
Bishop, M. (2004), Introduction to Computer Security, Addison-Wesley, ISBN-13: 978-0321247445 |
|
|
Last Updated |
September 2010 |
|