Overview

To view overview information, please select an offering from the drop-down menu above.

Academic contacts

To view unit coordinator information, please select an offering from the drop-down menu above.

Offerings

DUBAI-ISC-TJD-INT-2024-2024
DUBAI-ISC-TMD-INT-2023-2023
DUBAI-ISC-TSD-INT-2024-2024
KAPLAN-SGP-TJA-INT-2024-2024
KAPLAN-SGP-TMA-INT-2023-2023
KAPLAN-SGP-TSA-INT-2024-2024
MALAYSIAKL-TJC-INT-2024-2024
MALAYSIAKL-TMC-INT-2025-2025
MALAYSIAKL-TSC-INT-2024-2024
MURDOCH-S1-EXT-2018-ONGOING
MURDOCH-S1-INT-2018-ONGOING

Other learning activities

To view other learning activity information, please select an offering from the drop-down menu above.

Learning activities

To view learning activity information, please select an offering from the drop-down menu above.

Learning outcomes

1.

Describe the fundamentals of computer and network security

2.

Apply a wide range of tools and technologies to evaluate vulnerabilities

3.

Discuss and evaluate the significance of various security weaknesses

4.

Describe legal and ethical implications of computer security

5.

Investigate, implement and exploit security vulnerabilities in a lab environment

6.

Describe and select mitigation strategies for common attacks

Assessments

To view assessment information, please select an offering from the drop-down menu above.

Additional information

Unit content:The unit is organised into these topics: 1. Introduction to computer security, CIA triad, hacking phases 2. Software security, responsible vulnerability disclosure, Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE) 3. Buffer overflows and overreads and mitigations 4. Malware types, such as viruses, worms, Trojans, rootkits 5. Security architecture, access control theory, security models, systems evaluation, emanation attacks 6. Symmetric and asymmetric cryptography, public key infrastructure, attacks against cryptography 7. Authentication concepts, authentication factors, Windows and UNIX authentication, password attacks and mitigations 8. Network security, port and vulnerability scanning, packet sniffing, spoofing attacks and mitigations 9. Web security, SQL injection, session hijacking, cross-site request forgery, cross-site scripting 10. Covert channels, storage and timing channels, countermeasures against covert channels, air-gap channels 11. Botnets, polymorphic and metamorphic malware, malware economy, malware emerging trends 12. Human factors in computer security, risk perception and heuristics, scam principles