Unit convenor and teaching staff |
Unit convenor and teaching staff
Vijay Varadharajan
Contact via 98509536
E6A 336
Administration
Andrina Brennan
Contact via 98509536
E6A 336
Andrina Brennan
|
---|---|
Credit points |
Credit points
4
|
Prerequisites |
Prerequisites
COMP347
|
Corequisites |
Corequisites
|
Co-badged status |
Co-badged status
|
Unit description |
Unit description
As organisations and users increasingly rely upon networked applications for assessing information and making critical business decisions, securing distributed applications is becoming extremely significant. The unit is concerned with the protection of information in computing systems and networks. It will address concepts and techniques for securing distributed applications.
|
Information about important academic dates including deadlines for withdrawing from units are available at https://www.mq.edu.au/study/calendar-of-dates
On successful completion of this unit, you will be able to:
Standards
Grade |
Learning Outcome 1 |
Learning Outcome 2 |
Learning Outcome 3 |
Learning Outcome 4 |
Learning Outcome 5 |
|
Security Requirements |
Security Threats, Functionalities and Architecture |
Security Protocols |
Security services for distributed systems and networks |
Research and Critical Thinking and CommunicationSkills |
HD |
Demonstrates deep and critical understanding of key security requirements and shows substantial originality in their analysis and evaluation |
A critical understanding of security threats and able to develop threat model. Able to design appropriate security functionalities and develop an overall security architecture |
Demonstrates the ability to apply security techniques and mechanisms to identify flaws in security protocols. Demonstrate the ability to design secure protocols and carry out security analysis. |
Demonstrates the ability to design security services for distributed systems and networks and carry out their security analysis. |
Demonstrates significant originality and insight in critical evaluation of security solutions. Communicates effectively the analysis and the arguments. |
D |
Demonstrates good understanding of the security requirements and shows some originality in their analysis |
Demonstrates a clear understanding of threats and threat models. Demonstrates the ability to describe the design of security architecture and its functionalities |
Demonstrates the ability to apply security techniques and mechanisms to identify security flaws in protocols and carry out security analysis. |
Demonstrates a clear understanding of authentication and access control services in distributed systems and networks and the ability to analyse them. |
Demonstrates insights in solving security problems. Good presentation of ideas and arguments |
Credit |
Reasonable understanding of key security requirements and able to describe their characteristics |
Shows substantial understanding of security threats. Able to understand the security functionalities in a security architecture |
Demonstrates the ability to apply security techniques and mechanisms to describe security protocols and carry out some analysis. |
Good understanding of authentication and access control functionalities in distributed systems and networks. Able to carry out basic evaluation of these security services.
|
Provides evidence of a clear understanding of the security concepts and their applications. Clear communication of ideas. |
Pass |
Basic understanding of some of the security requirements |
Recognizes the security threats in a system. Demonstrates a basic understanding of the security functionalities needed to counteract the threats |
Demonstrates the ability to apply security techniques and mechanisms to understand security protocols.
|
Basic understanding of authentication and access control functionalities in distributed systems and networks
|
Provides sufficient evidence of security concepts and their applications. Communication of information and ideas adequately. |
Name | Weighting | Due |
---|---|---|
Exam | 60% | November 2014 |
Group Project | 30% | 26/27 Oct |
Assignment | 10% | 14/15 Sept |
Due: November 2014
Weighting: 60%
Due: November 2014
Weighting: 60%
Date to be confirmed by University in due course
Note: Need to obtain at least 25% out of 60% of the Exam component to pass the Unit
This Assessment Task relates to the following Learning Outcomes:
• Analyse the security threats and develop security architecture and functionalities to counteract the security threats
• Apply security techniques and mechanisms to develop security protocols
• Develop and/or advance skills of research and critical analysis in a manner consistent with the completion of a postgraduate degree.
Due: 26/27 Oct
Weighting: 30%
Due: 26th Oct, 11.59pm (electronically) and 27th Oct in Class (hard copy)
Weighting: 30%
Project topics allocated during Lectures
Project Allocated Week 7 15th Sept 2014, Report due 26th/27th Oct 2014
Presentations 27th Oct and 3rd Nov 2014
Content and Understanding: 10% (Individually assessed)
Presentation: 10% (Individually assessed)
Project Report: 10% (Assessed as a Group)
This Assessment Task relates to the following Learning Outcomes:
• Analyse key security requirements and trends in a distributed networked computing environment
• Analyse the security threats and develop security architecture and functionalities to counteract the security threats
• Apply security techniques and mechanisms to develop security protocols
• Develop and/or advance skills of research and critical analysis in a manner consistent with the completion of a postgraduate degree.
Due: 14/15 Sept
Weighting: 10%
Due: 14th Sept, 11.59pm (electronically) and 15th Sept in Class (hard copy)
Weighting: 10%
Handed out Week 4 25th August.
Assignment on Security Mechanisms and Protocols
This Assessment Task relates to the following Learning Outcomes:
• Analyse key security requirements and trends in a distributed networked computing environment
• Analyse the security threats and develop security architecture and functionalities to counteract the security threats
• Apply security techniques and mechanisms to develop security protocols
Technology
• Presentation using Powerpoint and other Computer Related Material
Lecture and Tutorial
• Provided in Unit Schedule
Information
• All unit information will be posted on iLearn (https://ilearn.mq.edu.au/login/MQ/ ). We assume that students will regularly check iLearn for information regarding lecture notes, practical material and other related resources.
• All emails related to ITEC852 should be sent to vijay.varadharajan@mq.edu.au and cc: andrina.brennan@mq.edu.au (Andrina Brennan, Executive Assistant to Prof. Vijay Varadharajan) and must include your full name and your student id number.
Other Material
References
• William Stallings, Cryptography and Network Security: Principles and Practices, Prentice Hall (4th Edition) · Charles Pfleeger, Security in Computing, Prentice Hall, 20026 (4th Edition)
• Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security: Private Communication in a Public World, Prentice Hall
• Dieter Gollman, Computer Security, John Wiley
• Simson Garfinkel and Gene Spafford, Practical Unix Security, O’Reilly & Associates, Inc.
• Trusted Computing Platforms: TCPA Technology in Context, Ed: Siani Pearson, Prentice Hall, 2003
• Ross Anderson, Security Engineering, John Wiley, 1st or 2nd Edition
Tentative Lecture Schedule ITEC 852 S2 2014 (may vary depending upon progress)
Macquarie University policies and procedures are accessible from Policy Central. Students should be aware of the following policies in particular with regard to Learning and Teaching:
Academic Honesty Policy http://mq.edu.au/policy/docs/academic_honesty/policy.html
Assessment Policy http://mq.edu.au/policy/docs/assessment/policy.html
Grading Policy http://mq.edu.au/policy/docs/grading/policy.html
Grade Appeal Policy http://mq.edu.au/policy/docs/gradeappeal/policy.html
Grievance Management Policy http://mq.edu.au/policy/docs/grievance_management/policy.html
Disruption to Studies Policy http://www.mq.edu.au/policy/docs/disruption_studies/policy.html The Disruption to Studies Policy is effective from March 3 2014 and replaces the Special Consideration Policy.
In addition, a number of other policies can be found in the Learning and Teaching Category of Policy Central.
Macquarie University students have a responsibility to be familiar with the Student Code of Conduct: https://students.mq.edu.au/support/student_conduct/
Late Submissions
No extensions will be granted. Students who have not submitted the task prior to the deadline will be awarded a mark of 0 for the task, except for cases in which an application for special consideration is made and approved.
Macquarie University provides a range of support services for students. For details, visit http://students.mq.edu.au/support/
Learning Skills (mq.edu.au/learningskills) provides academic writing resources and study strategies to improve your marks and take control of your study.
Students with a disability are encouraged to contact the Disability Service who can provide appropriate help with any issues that arise during their studies.
For all student enquiries, visit Student Connect at ask.mq.edu.au
For help with University computer systems and technology, visit http://informatics.mq.edu.au/help/.
When using the University's IT, you must adhere to the Acceptable Use Policy. The policy applies to all who connect to the MQ network including students.
Our postgraduates will be able to demonstrate a significantly enhanced depth and breadth of knowledge, scholarly understanding, and specific subject content knowledge in their chosen fields.
This graduate capability is supported by:
Our postgraduates will be capable of utilising and reflecting on prior knowledge and experience, of applying higher level critical thinking skills, and of integrating and synthesising learning and knowledge from a range of sources and environments. A characteristic of this form of thinking is the generation of new, professionally oriented knowledge through personal or group-based critique of practice and theory.
This graduate capability is supported by:
Our postgraduates will be capable of systematic enquiry; able to use research skills to create new knowledge that can be applied to real world issues, or contribute to a field of study or practice to enhance society. They will be capable of creative questioning, problem finding and problem solving.
This graduate capability is supported by:
Our postgraduates will be able to communicate effectively and convey their views to different social, cultural, and professional audiences. They will be able to use a variety of technologically supported media to communicate with empathy using a range of written, spoken or visual formats.
This graduate capability is supported by:
Our postgraduates will be ethically aware and capable of confident transformative action in relation to their professional responsibilities and the wider community. They will have a sense of connectedness with others and country and have a sense of mutual obligation. They will be able to appreciate the impact of their professional roles for social justice and inclusion related to national and global issues
This graduate capability is supported by:
Our postgraduates will demonstrate a high standard of discernment and common sense in their professional and personal judgment. They will have the ability to make informed choices and decisions that reflect both the nature of their professional work and their personal perspectives.
This graduate capability is supported by: