Internet Security
Overview
Students who complete this unit of study will understand the nature of security threats to IT systems. Students will also be aware of deficiencies in modern software systems and will understand how to manage the security of computer networks. Students will be familiar with the tools used by hackers and crackers and be aware of ways of identifying and rectifying security breaches and they will be able to collect digital evidence and understand the rules of evidence gathering.
Requisites
Rule
COS60004 Creating Web Applications
OR
COS60007 Creating Web Applications and Databases
OR
Admission into MA-ITPC1 - Master of Information Technology (Professional Computing)
OR
Admission into MA-ITPC - Master of Information Technology (Professional Computing)
AND
TNE60002 Network Administration
OR
COS70007 Data Communications and Security
OR
COS80021 Web Application Development
OR
TNE60006 Networks and Switching
01-June-2025
Learning outcomes
Students who successfully complete this unit will be able to:
- Evaluate security of networks and servers
- Determine suitable management plans for system security
- Develop audit plans which rate security of hosts, networks and systems
- Verify potential vulnerabilities through an understanding of social engineering
- Prioritise penetration testing activities by using a variety of security-related tools
- Verify potential vulnerabilities through an understand concepts of network monitoring
- Analyse and interpret logs and make recommendations on current Internet Security based on independent research
Teaching methods
Hawthorn
Type | Hours per week | Number of weeks | Total (number of hours) |
---|---|---|---|
Online Lecture |
1.00 | 12 weeks | 12 |
Live Online Class |
1.00 | 12 weeks | 12 |
On-campus Class |
2.00 | 12 weeks | 24 |
Unspecified Activities Independent Learning |
8.50 | 12 weeks | 102 |
TOTAL | 150 |
Assessment
Type | Task | Weighting | ULO's |
---|---|---|---|
Assignment 1 | Individual/Group | 30 - 40% | 4,5,6,7 |
Assignment 2 | Individual | 30 - 40% | 1,2,3,4,5,6,7 |
Laboratory Practicals | Individual | 10 - 20% | 1,2,3,4,5,6,7 |
Test | Individual | 10 - 20% | 1,2,3,4,7 |
Content
- Overview of Internet Crime and computer security threats
- Operating System Flaws
- Introduction to maintaining a Secure System
- Set up, patch and monitor
- Tools
- System logs
- Firewalls, security: theory, practice, design and implementation
- Ports scanning, packet sniffing and intrusion detection
- Understanding and responding to security alerts
- Server technologies, risks and policies
- Vulnerability analysis and Audit
- Secure programming practices
- Security Models
- Physical Security
- Authentication (identity, biometrics and digital signatures)
Study resources
Reading materials
A list of reading materials and/or required textbooks will be available in the Unit Outline on Canvas.