Subject Descriptions - Subject Information

Calendar: 2017 Postgraduate
Faculty: Faculty of Engineering and Information Sciences
Department: School of Computing and Information Technology

Subject Information
Subject Code CSCI969
Subject Name Topics in Applying Information Security
Credit Points 6
Pre-Requisites None.
Co-Requisites CSCI968 and (CSCI971 or INFO912)
Restrictions None.
Equivalence None.
General Subject No.
EFTSL (Non Weighted) 0.125
Non Weighted Student Contribution Amounts
Commonwealth Supported (HECS) Students Only
Pre-1997 Pre-2005 Post-2005 Post-2008 Post-2009 Post-2010
$ 1131  $ 1131  $ 1131  $ 1131  $ 1131  $ 1131 
Weighted Student Contribution Amounts  
Work Experience No
Tutorial Enrolment Information No tutorials for this subject
Availability Not Available in 2017

Subject Description
The class will be divided into groups of about 3 students. Each group will work independently on an implementation of a secure system requiring knowledge drawn from other subjects in the Information Security Major. The class will be provided with a foundational set of readings for the development of a secure, probably distributed, system. This is not a research project in the sense of developing a fundamentally new system, but research skills such as literature analysis in documents and exploring resources will be critical. Coding will be in either C or C++.

Subject Learning Outcomes
On successful completion of this subject, students will be able to:
1. Critically analyse literature in the context of previously gained knowledge.
2. Analyse a scenario to identify security issues.
3. Demonstrate the ability to identify appropriate tools and mechanisms to address particular security issues.
4. Demonstrate an ability to apply knowledge in the field of information security to develop and implement an appropriately secure, and probably distributed, system.
5. Demonstrate an appreciation of appropriate design and development processes, including documenting progress and results.
6. Demonstrate an ability to understand the formal security analysis of a system, in particular the identification of appropriate underlying assumptions.

Textbook Information

Text book information is available via the UniShop website:

Search Criteria [Click here for help]
Subject Code / Name
Delivery Method
General Subjects