Overview
To view overview information, please select an offering from the drop-down menu above.
Academic contacts
To view unit coordinator information, please select an offering from the drop-down menu above.
Offerings
DUBAI-ISC-TJD-INT-2020-ONGOING
DUBAI-ISC-TMD-INT-2019-2019
DUBAI-ISC-TSD-INT-2020-ONGOING
KAPLAN-SGP-TMA-INT-2019-2019
MURDOCH-S1-EXT-2018-ONGOING
MURDOCH-S1-INT-2018-ONGOING
Requisites
Prerequisite
Exclusion
Other learning activities
To view other learning activity information, please select an offering from the drop-down menu above.
Learning activities
To view learning activity information, please select an offering from the drop-down menu above.
Learning outcomes
1.
Understand the fundamentals of computer and network security
2.
Use a wide range of tools and technologies to evaluate vulnerabilities
3.
Have an awareness of the significance of various security weaknesses
4.
Understand the legal and ethical implications of computer security
5.
Implement and exploit security vulnerabilities in a lab environment
6.
Discuss and describe mitigation strategies for common attacks
Assessments
To view assessment information, please select an offering from the drop-down menu above.
Additional information
Unit content:The unit is organised into these topics:
1. Introduction to computer security, CIA triad, hacking phases
2. Software security, responsible vulnerability disclosure, Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE)
3. Buffer overflows and overreads and mitigations
4. Malware types, such as viruses, worms, Trojans, rootkits
5. Security architecture, access control theory, security models, systems evaluation, emanation attacks
6. Symmetric and asymmetric cryptography, public key infrastructure, attacks against cryptography
7. Authentication concepts, authentication factors, Windows and UNIX authentication, password attacks and mitigations
8. Network security, port and vulnerability scanning, packet sniffing, spoofing attacks and mitigations
9. Web security, SQL injection, session hijacking, cross-site request forgery, cross-site scripting
10. Covert channels, storage and timing channels, countermeasures against covert channels, air-gap channels
11. Botnets, polymorphic and metamorphic malware, malware economy, malware emerging trends
12. Human factors in computer security, risk perception and heuristics, scam principles