CYBERSECURITY IN PRACTICE

CSE1CPR

2018

Credit points: 15

Subject outline

Every organization and business that intends to protect itself from threats of cyber-attacks needs to know current practices in cyber defense. This subject will introduce common technologies used to identify and mitigate threats including firewalls, intrusion detection systems, intrusion protection systems and honeypots. This subject also introduces incident response processes and simple ways to incorporate secure programming practices to make computer programs less vulnerable to attacks.

School: School Engineering&Mathematical Sciences

Credit points: 15

Subject Co-ordinator: Abdun Mahmood

Available to Study Abroad Students: Yes

Subject year level: Year Level 1 - UG

Exchange Students: No

Subject particulars

Subject rules

Prerequisites: CSE1ICB

Co-requisites: N/A

Incompatible subjects: N/A

Equivalent subjects: N/A

Special conditions: N/A

Learning resources

Readings

Resource TypeTitleResource RequirementAuthor and YearPublisher
ReadingsThe Computer Incident Response Planning HandbookPrescribedN.K. McCarthy, 2013McGraw-Hill

Graduate capabilities & intended learning outcomes

01. Investigate, evaluate and apply current cybersecurity technologies that protect against cyber threats

Activities:
5 x 2 hour Lectures on existing intrusion detection techniques, how firewalls protect attacks on computer systems, and network security. These concepts will be practiced and tested in a laboratory environment using various testing tools.

02. Describe the process of threat and vulnerability identification in cybersecurity environments

Activities:
3 x 2 hour lectures on threat detection, vulnerability analysis, cyber incident analysis and response. Students will design and develop incident reports and response report during laboratory practice.

03. Formulate and coordinate basic cyber incident responses

Activities:
2 x 2 hour lectures on the steps involved in incident response. Students will analyze case studies and standards to describe the response process to cyber-attack incidents

04. Employ secure software design practices when working in teams.

Activities:
2 x 2 hour lectures on secure software design principles, and architecture, and testing of software.

Melbourne, 2018, Semester 2, Day

Overview

Online enrolment: Yes

Maximum enrolment size: N/A

Enrolment information:

Subject Instance Co-ordinator: Abdun Mahmood

Class requirements

LectureWeek: 31 - 43
One 2.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

Computer LaboratoryWeek: 32 - 43
One 2.0 hours computer laboratory per week on weekdays during the day from week 32 to week 43 and delivered via face-to-face.

Assessments

Assessment elementComments%ILO*
Written Report on current security technologies in practice (equivalent to 500 words)1001
Report on threat and vulnerability identification (equivalent to 1000 words)This assignment has two parts: A written 500 word report and a 10 minute oral presentation2002
Written Group submission on Software design practices (equivalent to 1000 words each)3003
One 2-hour exam (equivalent to 2000 words)4001, 02, 03, 04