Information Security Essay examples

Submitted By YuZhou1
Words: 2204
Pages: 9

Unit Outline 2013 Faculty of Business, Government & Law

Information Security


Page 1 of 6
Australian Government Higher Education (CRICOS) Registered Provider number: #00212K

This Unit Outline must be read in conjunction with: a) UC Student Guide to Policies, which sets out University-wide policies and procedures, including information on matters such as plagiarism, grade descriptors, moderation, feedback and deferred exams, and is available at (scroll to bottom of page) b) UC Guide to Student Services, and is available at (scroll to bottom of page) c) Any additional information specified in section 6h.

1a 1b 1c 1d 1e

General Information
Unit title – Information Security Unit number – 7162 Teaching Period and year offered – Semester 1, 2013 Credit point value – 3 credit points Unit level – 3

1f Name of Unit Convener and contact details (including telephone and email) Dale Kleeman, room 11C21, ph (02) 6201 2427 , box 202 Moderator: Lubna Alam, room 11C13, ph 6201 5143 1g Administrative contact details (including name, location, telephone and email) BGL Faculty Office, Room 6C38, Phone (02) 6206 8810

Page 2 of 6
Australian Government Higher Education (CRICOS) Registered Provider number: #00212K


Academic Content

2a Unit description and learning outcomes Syllabus This unit examines the vulnerabilities of computer-based information systems and methods of breach prevention, detection, and recovery. A risk management approach is used to develop an understanding of the policies, practices and technologies needed to provide for an appropriate level of security. The various security needs, from managerial to technical, are examined in the context of system design and security evaluation. Practical implementation of security requirements is presented. Learning Outcomes On completion of this unit, students will be able to evaluate and design information security layers for an organisation. 2b Generic skills The generic skills developed in your course are described at: The heading numbers used in that document are used in section 5a of this outline to specify the generic skills for this unit. As this is a PG level unit you are expected to already be competent at communication, project management and independent work. 2c Prerequisites and/or co-requisites Prerequisites: Designing Human-Computer Interaction; Systems Analysis and Modelling


Delivery of Unit and Timetable

3a Delivery mode Traditional mode; that is on-campus in standard semesters with weekly lectures and tutorials. 3b Timetable of activities, such as lectures/ tutorials/ practicals/ field classes, showing key dates and topics (Information might be provided in the form of a table ) Timetables and schedules: schedules of topics to be covered will be included on the unit website.


Unit Resources

4a Lists of required texts/readings Whitman, ME & Mattord, HJ 2011, Roadmap to Information Security: For IT and InfoSec Managers, Cengage Learning (will be available from Co-Op Bookshop) The following books are set as recommended readings. ISACA 2012, COBIT 5, ISACA ISO27000 series – Information technology — Security techniques — Information security management systems Whitman, ME & Mattord, HJ 2010, Management of information security, 3rd edn, Cengage Learning A range of academic articles relating to Information Security will also be used to support the teaching of this unit. For Unit readings and resources in the University of Canberra Library Link to search page for Unit Readings (print materials) 4b Materials and equipment – none 4c Unit website To find your unit site online, login to LearnOnline(Moodle) using your student ID.

Page 3 of 6