Course Coordinator:Erica Mealy (emealy@usc.edu.au) School:School of Science, Technology and Engineering
UniSC Sunshine CoastUniSC Moreton Bay |
Blended learning | Most of your course is on campus but you may be able to do some components of this course online. |
Online |
Online | You can do this course without coming onto campus. |
Please go to usc.edu.au for up to date information on the
teaching sessions and campuses where this course is usually offered.
With the increase of online and digital presence, the importance of security is becoming more apparent. Through this course you will learn the foundations of computer security including network security, device security and cyber security. This includes identifying the various security threats and developing ethical approaches to mitigate them.
Activity | Hours | Beginning Week | Frequency |
Blended learning | |||
Learning materials – Asynchronous learning material | 1hr | Week 1 | 13 times |
Tutorial/Workshop 1 – On campus | 2hrs | Week 1 | 13 times |
Seminar – On campus seminar | 1hr | Week 1 | 2 times |
Online | |||
Learning materials – Asynchronous learning material | 1hr | Week 1 | 13 times |
Tutorial/Workshop 1 – Online workshop | 2hrs | Week 1 | 12 times |
Seminar – Online seminar | 1hr | Week 1 | 2 times |
100 Level (Introductory)
12 units
Course Learning Outcomes On successful completion of this course, you should be able to... | Graduate Qualities Completing these tasks successfully will contribute to you becoming... | |
1 | Describe the structure of various networks and devices and the associated security processes and methods necessary to keep them secure | Knowledgeable |
2 | Compare and contrast the the various components of smart devices and the Internet, the types of information they share, and how they may be exploited by attackers. | Knowledgeable |
3 | Identify and discuss the ethical, social and societal costs to individuals and the community from security threats |
Ethical Sustainability-focussed |
4 | Analyse and communicate current cybersecurity threats, risks and vulnerabilities to a variety of technical and non-technical audiences. | Engaged |
5 | Identify and analyse significant cybersecurity challenges that threaten individuals and organisations and make recommendations to mitigate those threats |
Knowledgeable Creative and critical thinker Engaged |
Refer to the UniSC Glossary of terms for definitions of “pre-requisites, co-requisites and anti-requisites”.
Not applicable
Not applicable
Not applicable
Not applicable
Standard Grading (GRD)
High Distinction (HD), Distinction (DN), Credit (CR), Pass (PS), Fail (FL). |
Students will participate in continuous peer and self-assessment during tutorials and assessments.
Delivery mode | Task No. | Assessment Product | Individual or Group | Weighting % | What is the duration / length? | When should I submit? | Where should I submit it? |
All | 1 | Written Piece | Individual | 20% | 1500 word equivalent |
Week 5 | Online Assignment Submission with plagiarism check |
All | 2 | Oral and Written Piece | Group | 40% | 1500 words equivalent, PowerPoint presentation delivered as part of a group |
Week 10 | Online Assignment Submission with plagiarism check |
All | 3 | Portfolio | Individual | 40% | 50 questions |
Exam Period | Online Assignment Submission with plagiarism check |
All - Assessment Task 1:Cybersecurity Analysis Report | |
Goal: | This task will enable the student to identify and articulate in written format, technical and human factors vulnerabilities identified in a notional company. The assessment will require students to perform detailed analysis of the issues and perform synthesis by associating these vulnerabilities with a variety of attack methodologies. This writing assignment is also designed to introduce you to the art of technical writing. Technical writing is an important part of any professional job where you have to inform management, other employees, or the wider public community of vulnerabilities, exploits and fixes/solutions. This assignment will give you a taste of that environment, and prepare you for further technical writing requirements. |
Product: | Written Piece |
Format: | Written report |
Criteria: |
|
All - Assessment Task 2:Torchwood: capture the Flag | |
Goal: | This assessment is part of a progressive scenario where students will rely on the first assessment to successfully complete this assessment. Given a detailed cybersecurity scenario, each student will assume the role of an attack or a defender as part of a larger group. The scenario describes the cybersecurity posture of a company with national security contracts to a fictitious government. Students will operate in groups of 5 to 7 attackers and will have to devise a series of physical and cyber strategies to either attack and exploit the company using commercially available hacker tools and physical "tiger team" strategies, or, operate as defenders to devise defensive strategies to prevent their company from being successfully attacked using a myriad of physical and cyber defensive strategies. This assessment measures your ability to plan and execute a cybersecurity approach and to present your position to an audience of your peers. In addition to mimicking real-world group decision-making processes and group dynamics, you will have to coordinate your decisions with other decision-makers to execute your plan. |
Product: | Oral and Written Piece |
Format: | PowerPoint presentation |
Criteria: |
|
All - Assessment Task 3:Portfolio | |
Goal: | To conduct research using Canvas material and online content to answer a series of questions relating to cybersecurity threats, mitigation strategies, policies and procedures, education and training. |
Product: | Portfolio |
Format: | The portfolio will consist of 50 questions that can be answered through Canvas and online research |
Criteria: |
|
A 12-unit course will have total of 150 learning hours which will include directed study hours (including online if required), self-directed learning and completion of assessable tasks. Student workload is calculated at 12.5 learning hours per one unit.
Please note: Course information, including specific information of recommended readings, learning activities, resources, weekly readings, etc. are available on the course Canvas site– Please log in as soon as possible.
Please note that you need to have regular access to the resource(s) listed below. Resources may be required or recommended.
Required? | Author | Year | Title | Edition | Publisher |
Recommended | Joseph Migga Kizza | 2018 | Guide to Computer Network Security | 4th | Springer |
Required | William Stallings,Lawrie Brown | 2017 | Computer Security | Fourth | Pearson Higher Education |
This is a basic, entry level course which does not require any formalised computer or networking experience. To access the course, students need access to a computing device or laptop running a current operating system capable of accessing MS Sway, Canvas, and the Internet. The device should also a graphics card and applicable software able to either play or stream multimedia content.
Academic integrity is the ethical standard of university participation. It ensures that students graduate as a result of proving they are competent in their discipline. This is integral in maintaining the value of academic qualifications. Each industry has expectations and standards of the skills and knowledge within that discipline and these are reflected in assessment.
Academic integrity means that you do not engage in any activity that is considered to be academic fraud; including plagiarism, collusion or outsourcing any part of any assessment item to any other person. You are expected to be honest and ethical by completing all work yourself and indicating in your work which ideas and information were developed by you and which were taken from others. You cannot provide your assessment work to others. You are also expected to provide evidence of wide and critical reading, usually by using appropriate academic references.
In order to minimise incidents of academic fraud, this course may require that some of its assessment tasks, when submitted to Canvas, are electronically checked through Turnitin. This software allows for text comparisons to be made between your submitted assessment item and all other work to which Turnitin has access.
Your eligibility for supplementary assessment in a course is dependent of the following conditions applying: The final mark is in the percentage range 47% to 49.4% The course is graded using the Standard Grading scale You have not failed an assessment task in the course due to academic misconduct
Late submission of assessment tasks may be penalised at the following maximum rate: - 5% (of the assessment task's identified value) per day for the first two days from the date identified as the due date for the assessment task. - 10% (of the assessment task's identified value) for the third day - 20% (of the assessment task's identified value) for the fourth day and subsequent days up to and including seven days from the date identified as the due date for the assessment task. - A result of zero is awarded for an assessment task submitted after seven days from the date identified as the due date for the assessment task. Weekdays and weekends are included in the calculation of days late. To request an extension you must contact your course coordinator to negotiate an outcome.
UniSC is committed to a culture of respect and providing a safe and supportive environment for all members of our community. For immediate assistance on campus contact SafeUniSC by phone: 07 5430 1168 or using the SafeZone app. For general enquires contact the SafeUniSC team by phone 07 5456 3864 or email safe@usc.edu.au.
The SafeUniSC Specialist Service is a Student Wellbeing service that provides free and confidential support to students who may have experienced or observed behaviour that could cause fear, offence or trauma. To contact the service call 07 5430 1226 or email studentwellbeing@usc.edu.au.
For help with course-specific advice, for example what information to include in your assessment, you should first contact your tutor, then your course coordinator, if needed.
If you require additional assistance, the Learning Advisers are trained professionals who are ready to help you develop a wide range of academic skills. Visit the Learning Advisers web page for more information, or contact Student Central for further assistance: +61 7 5430 2890 or studentcentral@usc.edu.au.
Student Wellbeing provide free and confidential counselling on a wide range of personal, academic, social and psychological matters, to foster positive mental health and wellbeing for your academic success.
To book a confidential appointment go to Student Hub, email studentwellbeing@usc.edu.au or call 07 5430 1226.
Ability Advisers ensure equal access to all aspects of university life. If your studies are affected by a disability, learning disorder mental health issue, injury or illness, or you are a primary carer for someone with a disability or who is considered frail and aged, AccessAbility Services can provide access to appropriate reasonable adjustments and practical advice about the support and facilities available to you throughout the University.
To book a confidential appointment go to Student Hub, email AccessAbility@usc.edu.au or call 07 5430 2890.
For more information on Academic Learning & Teaching categories including:
For more information, visit https://www.usc.edu.au/explore/policies-and-procedures#academic-learning-and-teaching
UniSC is committed to excellence in teaching, research and engagement in an environment that is inclusive, inspiring, safe and respectful. The Student Charter sets out what students can expect from the University, and what in turn is expected of students, to achieve these outcomes.