Overview

To view overview information, please select an offering from the drop-down menu above.

Academic contacts

To view unit coordinator information, please select an offering from the drop-down menu above.

Offerings

DUBAI-ISC-TJD-INT-2020-ONGOING
DUBAI-ISC-TMD-INT-2019-2019
DUBAI-ISC-TSD-INT-2020-ONGOING
KAPLAN-SGP-TMA-INT-2019-2019
MURDOCH-S1-EXT-2018-ONGOING
MURDOCH-S1-INT-2018-ONGOING

Other learning activities

To view other learning activity information, please select an offering from the drop-down menu above.

Learning activities

To view learning activity information, please select an offering from the drop-down menu above.

Learning outcomes

1.
Understand the fundamentals of computer and network security
2.
Use a wide range of tools and technologies to evaluate vulnerabilities
3.
Have an awareness of the significance of various security weaknesses
4.
Understand the legal and ethical implications of computer security
5.
Implement and exploit security vulnerabilities in a lab environment
6.
Discuss and describe mitigation strategies for common attacks

Assessments

To view assessment information, please select an offering from the drop-down menu above.

Additional information

Unit content:The unit is organised into these topics: 1. Introduction to computer security, CIA triad, hacking phases 2. Software security, responsible vulnerability disclosure, Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE) 3. Buffer overflows and overreads and mitigations 4. Malware types, such as viruses, worms, Trojans, rootkits 5. Security architecture, access control theory, security models, systems evaluation, emanation attacks 6. Symmetric and asymmetric cryptography, public key infrastructure, attacks against cryptography 7. Authentication concepts, authentication factors, Windows and UNIX authentication, password attacks and mitigations 8. Network security, port and vulnerability scanning, packet sniffing, spoofing attacks and mitigations 9. Web security, SQL injection, session hijacking, cross-site request forgery, cross-site scripting 10. Covert channels, storage and timing channels, countermeasures against covert channels, air-gap channels 11. Botnets, polymorphic and metamorphic malware, malware economy, malware emerging trends 12. Human factors in computer security, risk perception and heuristics, scam principles