Unit convenor and teaching staff |
Unit convenor and teaching staff
Unit Convenor
Udaya Tupakula
Contact via udaya.tupakula@mq.edu.au
321, E6A
Monday: 5.00 - 6.00 pm or by appointment
|
---|---|
Credit points |
Credit points
4
|
Prerequisites |
Prerequisites
COMP342 or COMP343 or COMP347
|
Corequisites |
Corequisites
|
Co-badged status |
Co-badged status
|
Unit description |
Unit description
This unit covers the fundamental technologies and processes that underpin good systems security management within modern organisations. We consider the underlying mechanics of information and communications technology security infrastructures, security requirements, security architectures and models, cryptography, secure protocols, authentication, key management, PKI, access control, auditing and intrusion detection.
|
Information about important academic dates including deadlines for withdrawing from units are available at https://www.mq.edu.au/study/calendar-of-dates
On successful completion of this unit, you will be able to:
Name | Weighting | Due |
---|---|---|
Quiz | 25% | Week 6 |
Project | 25% | Week 11 |
Exam | 50% | TBC |
Due: Week 6
Weighting: 25%
Quiz (close book) will be based on your previously covered lecture material for weeks 1-5. The quiz questions will be handed over to you at the beginning of your Lecture class. It will be about 1 hour and consists of multiple choice and short answer questions. Quiz will be followed by discussion on the solutions. Quiz will serve as a feedback mechanism to monitor your progress in the unit.
Due: Week 11
Weighting: 25%
Project Assigned on Week 6
Report: 8%
Content and Understanding: 9%
Presentation: 8%
The task is group based with individual contributions clearly outlined
Students are expected to contribute in all the components of the project: project report, content and understanding and presentation
Project reports can be submitted on iLearn (https://ilearn.mq.edu.au/login/MQ)
Due: TBC
Weighting: 50%
Need to obtain atleast 30% in the Exam component to pass the unit.
The exam will be a written exam with some multiple choice and questions from topics covered in the lectures.
It will be held in the usual examination period of the semester. Students have 3 hours written time plus 10 minutes reading time for the exam.
Technology:
Lecture and Tutorial:
ITEC855 is taught via lectures and sessions.
All unit information will be posted on iLearn (https://ilearn.mq.edu.au/login/MQ/). We assume that students will regularly check iLearn for information regarding lecture notes and other related resources.
It should be noted that no single text book completely covers the content of this unit. Below books are recommended (not compulsory) for the course.
References:
Week 1 Introduction
Week 2 Software security
Week 3 Software security attacks analysis
Week 4 Network security attacks analysis
Week 5 Penetration testing
Week 6 Quiz and Group project allocation
Week 7 Security techniques & tools-1
Week 8 Security techniques & tools- 2
Week 9 Software assurance techniques
Week 10 Building secure software
Week 11 Group project assessment
Week 12 Revision
Week 13 No lecture (Public Holiday)
Macquarie University policies and procedures are accessible from Policy Central. Students should be aware of the following policies in particular with regard to Learning and Teaching:
Academic Honesty Policy http://mq.edu.au/policy/docs/academic_honesty/policy.html
Assessment Policy http://mq.edu.au/policy/docs/assessment/policy.html
Grading Policy http://mq.edu.au/policy/docs/grading/policy.html
Grade Appeal Policy http://mq.edu.au/policy/docs/gradeappeal/policy.html
Grievance Management Policy http://mq.edu.au/policy/docs/grievance_management/policy.html
Disruption to Studies Policy http://www.mq.edu.au/policy/docs/disruption_studies/policy.html The Disruption to Studies Policy is effective from March 3 2014 and replaces the Special Consideration Policy.
In addition, a number of other policies can be found in the Learning and Teaching Category of Policy Central.
Macquarie University students have a responsibility to be familiar with the Student Code of Conduct: https://students.mq.edu.au/support/student_conduct/
Macquarie University provides a range of support services for students. For details, visit http://students.mq.edu.au/support/
Learning Skills (mq.edu.au/learningskills) provides academic writing resources and study strategies to improve your marks and take control of your study.
Students with a disability are encouraged to contact the Disability Service who can provide appropriate help with any issues that arise during their studies.
For all student enquiries, visit Student Connect at ask.mq.edu.au
For help with University computer systems and technology, visit http://informatics.mq.edu.au/help/.
When using the University's IT, you must adhere to the Acceptable Use Policy. The policy applies to all who connect to the MQ network including students.
Our postgraduates will be able to demonstrate a significantly enhanced depth and breadth of knowledge, scholarly understanding, and specific subject content knowledge in their chosen fields.
This graduate capability is supported by:
Our postgraduates will be capable of utilising and reflecting on prior knowledge and experience, of applying higher level critical thinking skills, and of integrating and synthesising learning and knowledge from a range of sources and environments. A characteristic of this form of thinking is the generation of new, professionally oriented knowledge through personal or group-based critique of practice and theory.
This graduate capability is supported by:
Our postgraduates will be capable of systematic enquiry; able to use research skills to create new knowledge that can be applied to real world issues, or contribute to a field of study or practice to enhance society. They will be capable of creative questioning, problem finding and problem solving.
This graduate capability is supported by:
Our postgraduates will be able to communicate effectively and convey their views to different social, cultural, and professional audiences. They will be able to use a variety of technologically supported media to communicate with empathy using a range of written, spoken or visual formats.
This graduate capability is supported by:
Our postgraduates will be ethically aware and capable of confident transformative action in relation to their professional responsibilities and the wider community. They will have a sense of connectedness with others and country and have a sense of mutual obligation. They will be able to appreciate the impact of their professional roles for social justice and inclusion related to national and global issues
This graduate capability is supported by:
Our postgraduates will demonstrate a high standard of discernment and common sense in their professional and personal judgment. They will have the ability to make informed choices and decisions that reflect both the nature of their professional work and their personal perspectives.
This graduate capability is supported by:
Grade |
Learning Outcome 1 |
Learning Outcome 2 |
Learning Outcome 3 |
Learning Outcome 4 |
Learning Outcome 5 |
|
Security Requirements |
Security Attacks |
Security Techniques |
Software Assurance |
Critical thinking and communication skills |
HD |
Demonstrates deep and critical understanding of the security requirements and shows originality in the analysis and evaluation. |
Critical understanding of the security attacks and root cause identification and analysis of the attacks. |
Deep understanding of the security techniques, ability to design and develop security solutions to deal with the security attacks. Shows originality in the application of security technique and evaluate their effectiveness
|
Novel use of the security techniques and excellent understanding of concepts for building secure software and improving software assurance. |
Demonstrate original ideas, superior analysis and effective communication skills on the issues related to complex problems. |
D |
Demonstrate good understating and shows some originality in their analysis. |
Good understanding of the security attacks and ability to relate them with the weakness in software and networks. |
Good understanding of the security techniques, ability to design and develop security solutions and perform their analysis. |
Good understanding of the concepts for building secure software and improving software assurance. |
Demonstrate deep insights, and effective communication on the issues related to complex problems. |
Credit |
Reasonable understating of the security requirements and able to describe them. |
Clear understating of the security attacks and able to analyse the attacks. |
Reasonable understanding of the security techniques, ability to apply them to counteract attacks. |
Reasonable understanding of the concepts for building secure software and improving software assurance. |
Provides evidence of clear understanding and good communication on the issues related to complex problems. |
Pass |
Basic understanding of some of the security requirements |
Basic understanding of the security attacks |
Basic understanding of the security techniques and ability to apply them to counteract some of the attacks. |
Some understanding of the concepts for building secure software and improve software assurance. |
Provides evidence of some understanding and able to present on the issues related to complex problems. |
Grading
At the end of the semester, you will receive a grade that reflects your achievement in the unit
In this unit, your final grade depends on your performance in each part of the assessment. For each task, you receive a mark that combines your standard of performance regarding each learning outcome assessed by this task. Then the different component marks are added up to determine your total mark out of 100. Your grade then depends on this total mark and your overall standards of performance.
Concretely, in order to pass the unit, you must
Students obtaining a higher grade than a pass in this unit will (in addition to the above)