Information on this page, including unit offerings, is from the 2019 academic year.
Security Architectures and Systems Administration (ICT379)
|Organisational Unit||Information Technology, Mathematics and Statistics|
|Availability||MURDOCH: S2-internal, S2-external
KAPLAN-SGP: TJA-internal, TSA-internal
|Teaching Timetables||Murdoch S2
|Description||This unit will consider the architecture and administration of a secure computing environment from several perspectives: that of the local machine, a networked computer system, and finally an organisational IT infrastructure. The unit provides an understanding of the hardware and software environment required to support security and mitigate risks, reviews models of system security, and reviews techniques to evaluate and measure system security. Throughout these areas, systems analysis tools and techniques will be introduced to support these security goals.|
|Unit Learning Outcomes||At the completion of this unit, students will be able to:
1. Identify the different layers of security architectures in computer systems.
2. Understand the application of security architecture and access control principles to real-world computer systems.
3. Explain the role of authentication in security architectures, including its applications.
4. Describe the application of cryptographic primitives to various basic protocols.
5. Discuss the security of networks from an architectural perspective.
6. Analyse systems and software to identify and mitigate basic threats.
7. Demonstrate how to install and manage the security of Windows server systems and networks.
8. Analyse the architectural security of the system to identify underlying weaknesses and suggests the mechanisms necessary to resolve these
|Timetabled Learning Activities||Lectures: 1 x 2 hours per week; tutorials: 1 x 2 hours per week.
All offerings of this unit include the equivalent of 30 hours of structured learning.
|Unit Learning Experiences||You will start by applying basic security principles at a local machine level and will gradually build upon this knowledge until you are able to assess and make security recommendations for a large scale computing environment. The lectures will mostly focus on the theoretical concepts required for an understanding of security architectures. The systems administration skills that complement this understanding are featured in the tutorial sessions. As the unit aims to teach a range of practical, real-world skills, students will be required to keep up to date with weekly unit tasks or discussions, as well as industry trends and cases.|
|Assessment||Participation quiz (10%)
Tutorial participation and worksheet submission (15%)
Mid-semester assessment (20%)
Security Architecture Assignment (15%)
Final Exam (40%).
Feedback will be provided for all assessment components, including ongoing worksheets in either written or verbal form.
|Prerequisites||ICT287 Computer Security.|
|Appears in these Courses/Majors:
see individual structures for context
|Appears in these Minors||Computer Forensics and Computer Security
|Internet Access Requirements||Murdoch units normally include an online component comprising materials, discussions, lecture recordings and assessment activities. All students, regardless of their location or mode of study, need to have access to and be able to use computing devices with browsing capability and a connection to the Internet via Broadband (Cable, ADSL or Mobile) or Wireless. The Internet connection should be readily available and allow large amounts of data to be streamed or downloaded (approximately 100MB per lecture recording). Students also need to be able to enter into online discussions and submit assignments online.|