CYBER ALGORITHMS THAT CHANGED THE FUTURE

CSE1ACF

2019

Credit points: 15

Subject outline

This subject introduces core algorithms in cybersecurity that support confidentiality, integrity and availability in information systems. Students will be exposed to the conception, design and implementation processes for new algorithms as they relate to cybersecurity. Real-world case studies from intelligence analysis, fraud, databases, networks and firewalls will be used to illustrate how algorithms can be applied to solve problems. This subject does not require prior knowledge of computer programming.

SchoolSchool Engineering&Mathematical Sciences

Credit points15

Subject Co-ordinatorPaul Watters

Available to Study Abroad StudentsNo

Subject year levelYear Level 1 - UG

Exchange StudentsNo

Subject particulars

Subject rules

PrerequisitesN/A

Co-requisitesN/A

Incompatible subjectsN/A

Equivalent subjectsN/A

Special conditionsN/A

Readings

Resource TypeTitleResource RequirementAuthor and YearPublisher
ReadingsNine Algorithms That Changed The Future.PrescribedMacCormick, J. (2013)Princeton University Press

Graduate capabilities & intended learning outcomes

01. Demonstrate foundation knowledge in the latest algorithms for cybersecurity

Activities:
2x2 hour lectures. Students provided with an introduction to algorithms and cybersecurity, including The security triad: Confidentiality, Integrity and Availability, Uses of Digital Forensics, and Understanding Digital Investigation Approach.
Related graduate capabilities and elements:
Literacies and Communication Skills (Quantitative Literacy,Cultural Literacy)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)
Personal and Professional Skills (Autonomy and independence,Ethical behaviour,Adaptability Skills,Study and Learning Skills)
Personal and Professional Skills (Autonomy and independence,Ethical behaviour,Adaptability Skills,Study and Learning Skills)
Personal and Professional Skills (Autonomy and independence,Ethical behaviour,Adaptability Skills,Study and Learning Skills)

02. Define requirements for cybersecurity algorithms and ordered steps in a formal language

Activities:
2x2 hour lectures. Students provided with an introduction to Public Key Cryptography, including Asymmetric Ciphers, Key Exchange and Cryptanalysis. This will be followed by tutorials to discuss in-depth cryptanalysis.
Related graduate capabilities and elements:
Literacies and Communication Skills (Quantitative Literacy,Cultural Literacy)
Literacies and Communication Skills (Quantitative Literacy,Cultural Literacy)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)

03. Review algorithms in solving cybersecurity problems

Activities:
2x2 hour lectures. Students provided with an introduction to Pattern Recognition, including Nearest-neighbor classifiers, Decision trees, Neural networks, Cluster analysis and Principal components analysis
Related graduate capabilities and elements:
Literacies and Communication Skills (Quantitative Literacy,Cultural Literacy)
Literacies and Communication Skills (Quantitative Literacy,Cultural Literacy)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)
Personal and Professional Skills (Autonomy and independence,Ethical behaviour,Adaptability Skills,Study and Learning Skills)

04. Interpret the steps required to correctly execute an algorithm

Activities:
2x2 hour lectures. Students provided with an introduction to Data Compression, including Lossless compression, Lossy compression, and Database Algorithms
Related graduate capabilities and elements:
Literacies and Communication Skills (Quantitative Literacy,Cultural Literacy)
Literacies and Communication Skills (Quantitative Literacy,Cultural Literacy)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)

05. Describe the performance, accuracy and reliability of algorithms using real-world data

Activities:
2x2 hour lectures. Students provided with an introduction to Digital Signatures, including Authentication, Integrity and Non-repudiation, and Computability
Related graduate capabilities and elements:
Literacies and Communication Skills (Quantitative Literacy,Cultural Literacy)
Literacies and Communication Skills (Quantitative Literacy,Cultural Literacy)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)
Inquiry and Analytical Skills (Critical Thinking,Creative Problem-solving,Inquiry/Research)
Discipline -Specific Knowledge and Skills (Discipline-Specific Knowledge and Skills)

Subject options

Select to view your study options…

Start date between: and    Key dates

Melbourne, 2019, Semester 2, Day

Overview

Online enrolmentYes

Maximum enrolment sizeN/A

Enrolment information

Subject Instance Co-ordinatorPaul Watters

Class requirements

Lecture Week: 31 - 43
Two 1.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.

Computer Laboratory Week: 32 - 43
One 2.0 hours computer laboratory per week on weekdays during the day from week 32 to week 43 and delivered via face-to-face.

Assessments

Assessment elementComments% ILO*
2 x 30 minute Lab quizzes (30 minutes each. Total equivalent to 1000 words)20 01, 02, 03, 04, 05
Written report on algorithms in solving cybersecurity problems (equivalent to 500 words)10 02, 03
Written report on the performance, accuracy & reliability of algorithms in Cyber (equiv 1000 words)20 05
2 hour Examination50 01, 02, 03, 04, 05