COMP3300 is a BYOD (Bring Your Own Device). You will be expected to bring your own laptop computer (Windows, Mac, or Linux) to the workshop, install and configure the required software, and incorporate secure practices into your daily work (and play!) routines.
Each week you should complete any assigned readings and review the lecture slides in order to prepare for the lecture. There are two hours of lectures and a one-hour workshop every week. The hands-on exercises in workshops help to reinforce concepts introduced during the lectures. You should have chosen a practical on enrollment. You will find it helpful to read the workshop instructions before attending - that way, you can get to work quickly! For details of days, times, and rooms consult the timetables webpage. Note that Workshops commence in Week 1. Please note that you will be required to submit work every week.
The following textbooks contain the bulk of weekly readings:
- Corporate computer security, by Randall J. Boyle and Raymond R. Panko (available online from the library).
- Information privacy engineering and privacy by design, by William Stallings (available online from the library).
- The Science of Quantitative Information Flow, by M. Alvim, K. Chatzikokolakis, A. McIver, C. Morgan, C. Palamidessi, G. Smith. (available online from the library)
- Other material in the form of scientific papers will be made available as needed.
Unit Websites. COMP3300 is administered via iLearn (http://ilearn.mq.edu.au/).
Lecture recordings. Digital recordings of lectures may be available. When available they will be linked from iLearn.
This unit makes use of discussion boards hosted within iLearn. Please post questions there; they are monitored by the staff on the unit.
• Attend lectures, take notes, ask questions.
• Attend weekly practical sessions.
• Read appropriate sections of the text, add to your notes, and prepare questions for your lecturer/tutor.
• Work on any assignments that have been released.