Fundamentals of Security

UTS

Course Description

  • Course Name

    Fundamentals of Security

  • Host University

    UTS

  • Location

    Sydney, Australia

  • Area of Study

    Computer Engineering, Computer Info Systems, Computer Programming, Computer Science, Information Sciences, Information Technologies

  • Language Level

    Taught In English

  • Prerequisites

    31268 Web Systems OR 48410 Introduction to ICT Engineering OR 31270 Networking Essentials OR 48720 Network Fundamentals OR 48721 Strategic e-Business Technologies

  • Course Level Recommendations

    Upper

    ISA offers course level recommendations in an effort to facilitate the determination of course levels by credential evaluators.We advice each institution to have their own credentials evaluator make the final decision regrading course levels.

    Hours & Credits

  • Credit Points

    6
  • Recommended U.S. Semester Credits
    4
  • Recommended U.S. Quarter Units
    6
  • Overview

    Description
    Security is a major issue for enterprises, with breaches leaving them vulnerable to legal sanctions, financial loss or reduced customer confidence. This subject introduces students to modern security issues and technologies by considering various aspects, from security principles and policies, to network and system security, as well as intrusion detection and cyber security.
    Subject objectives
    Upon successful completion of this subject students should be able to:
    1. Explain the major theories and principles and security policies
    2. Explain the underlying algorithms used for encryption and cryptographically mathematics
    3. Explain network security concepts
    4. Explain the concepts of system security
    5. Explain issues with viruses worm and intrusion detection, and cyber-security
    This subject also contributes specifically to the development of the following course intended learning outcomes:
    Apply systems thinking to understand complex system behaviour including interactions between components and with other systems (social, cultural, legislative, environmental, business etc.) [EA Stage 1 Competency: 1.5 ] (A.5)
    Identify and apply relevant problem solving methodologies [EA Stage 1 Competency:1.1, 2.1, 2.2, 2.3] (B.1)
    Design components, systems and/or processes to meet required specifications [EA Stage 1 Competency: 1.3, 1.6, 2.1, 2.2, 2.3] (B.2)
    Apply decision making methodologies to evaluate solutions for efficiency, effectiveness and sustainability [EA Stage 1 Competency: 1.2, 2.1] (B.4)
    Implement and test solutions [EA Stage 1 Competency: 2.2, 2.3,] (B.5)
    Demonstrate research skills [EA Stage 1 Competency: 1.4, 2.1] (B.6)
    Work as an effective member or leader of diverse teams within a multi-level, multi-disciplinary and multi-cultural setting [EA Stage 1 Competency:2.4, 3.2, 3.6] (E.2)
    Identify and apply relevant project management methodologies [EA Stage 1 Competency: 1.6, 2.2, 2.4] (E.3)
    Teaching and learning strategies
    Since this is a foundation security subject, the subject delivery consists of formal lectures, tutorials and lab sessions, together with a project. It is the responsibility of the student to read the UTS Online regularly.
    This is a 6cp subject. It includes 3 hours of face-to-face lectures and tutorials per week throughout the semester.
    Lectures are supported by a power-point slides and strategies from the Learning Guide. Not all the material in the subject notes will be covered during the lecture. It is the responsibility of the students to read all materials that are not covered during the lecture hours. All materials given in the subject handout pertaining to the review questions are examinable.
    You will gain most from the lectures if you read each week's material in advance and clarify your doubts during tutorial times.
    Content
    This subject covers the Fundamentals issues of security, and latest developments on security protocols, technologies, standards and applications. It includes,
    Cryptography and security algorithms, protocols and applications:
    RC4, Feistel ciphers, P Boxes, S Boxes, DES, 3DES and AES. Public key cryptography ? Primes, Key Distribution and RSA. Message authentication principles ? Hash functions, MAC, HMAC, MD5 and SHA. Digital Signatures - RSA and Certificate Authorities. Diffie-Hellman key exchange, X.509 certificates.
    Some basic Network Security Applications, including Mail security ? PGP & S/MIME. IP security ? IKE. ISAKMP, IPsec. Web security ? SSL/TLS.
    Some system security issues: operating system, file system and memory security.
    Assessment
    Assessment task 1: Quiz 1 & 2
    Intent:
    The Quizzes are designed to motivate continuous learning, analysis and recall the technical knowledge relevant to the subject concepts.
    Objective(s):
    This assessment task addresses subject learning objectives:
    1, 2, 3, 4 and 5
    This assessment task contributes to the development of the following course intended learning outcomes:
    A.5 and B.1
    Type: Quiz/test
    Groupwork: Individual
    Weight: 25%
    Length:
    Approx. 40 minutes in duration
    Criteria linkages:
    Criteria Weight (%) SLOs CILOs
    Correctness of solutions 50 1, 2, 3, 4, 5 A.5
    Understanding and applying the concept 50 1, 2, 3, 4, 5 B.1
    SLOs: subject learning objectives
    CILOs: course intended learning outcomes
    Assessment task 2: A practise-based group project
    Intent:
    Give students the opportunity to extend from the theory gained during the subject, into a practical design and implementation of a security algorithm and/or a system. The details of the project specification will be given to students around week 6.
    Objective(s):
    This assessment task addresses subject learning objectives:
    1, 2, 3, 4 and 5
    This assessment task contributes to the development of the following course intended learning outcomes:
    A.5, B.2, B.4, B.5, B.6, E.2 and E.3
    Type: Project
    Groupwork: Group, group and individually assessed
    Weight: 20%
    Length:
    To be advised.
    Criteria linkages:
    Criteria Weight (%) SLOs CILOs
    Program Completeness and correctness 50 1, 2, 3, 4, 5 A.5, B.2, B.4, B.5, E.2, E.3
    Additional analysis and innovation 20 1, 2, 3, 4, 5 A.5, B.2, B.4, B.5, B.6, E.2, E.3
    Well documented report 10 1, 2, 3, 4, 5 A.5, B.2, B.4, B.5, B.6, E.2
    Ability to answer questions during the demo day (individual) 20 1, 2, 3, 4, 5 A.5, B.2, B.4, B.5
    SLOs: subject learning objectives
    CILOs: course intended learning outcomes
    Assessment task 3: Exam
    Intent:
    The exam will explore the extent of student?s knowledge and understanding of key and current standards, applications and technologies in network and systems security. The material examined will cover Lectures from Week 1 to week 13.
    Objective(s):
    This assessment task addresses subject learning objectives:
    1, 2, 3, 4 and 5
    This assessment task contributes to the development of the following course intended learning outcomes:
    A.5
    Type: Examination
    Groupwork: Individual
    Weight: 55%
    Length:
    3 hours + 10 minutes reading time.
    Criteria linkages:
    Criteria Weight (%) SLOs CILOs
    Correctness of solutions 50 1, 2, 3, 4, 5 A.5
    Understanding and applying the concept 50 1, 2, 3, 4, 5 A.5
    SLOs: subject learning objectives
    CILOs: course intended learning outcomes
    Minimum requirements
    A passing grade will be awarded if an aggregate mark of 50% or better is achieved overall. Further, to pass the subject, students must achieve at least 50% in the written exam. In general, supplementary assessments are not offered in this subject. Students are referred to the University Policy and Procedures for the Assessment of Coursework Subjects for further details.

Course Disclaimer

Courses and course hours of instruction are subject to change.

Credits earned vary according to the policies of the students' home institutions. According to ISA policy and possible visa requirements, students must maintain full-time enrollment status, as determined by their home institutions, for the duration of the program.