CYBER ALGORITHMS

CYB5CYA

2020

Credit points: 15

Subject outline

This subject introduces algorithmic thinking in cybersecurity. Cyber algorithms and models are required to design and implement secure systems that support Confidentiality, Integrity and Availability (CIA security triad) in a range of use cases. You will discuss how to analyse, evaluate and design new algorithms in cybersecurity using a visual modelling language. Real-world case studies from intelligence analysis, fraud, data safeguarding and secure communication will be used to illustrate how cyber algorithms and models can be applied to solve problems. This subject does not require prior knowledge of computer programming.

School: Engineering and Mathematical Sciences (Pre 2022)

Credit points: 15

Subject Co-ordinator: Kayes Kayes

Available to Study Abroad/Exchange Students: No

Subject year level: Year Level 5 - Masters

Available as Elective: No

Learning Activities: N/A

Capstone subject: No

Subject particulars

Subject rules

Prerequisites: Must be admitted into SMCYC or SMCYL or SMCYB or must obtain subject coordinator's approval

Co-requisites: N/A

Incompatible subjects: N/A

Equivalent subjects: N/A

Quota Management Strategy: N/A

Quota-conditions or rules: N/A

Special conditions: N/A

Minimum credit point requirement: N/A

Assumed knowledge: N/A

Learning resources

Nine Algorithms That Changed The Future

Resource Type: Book

Resource Requirement: Prescribed

Author: MacCormick, J.

Year: 2013

Edition/Volume: N/A

Publisher: Princeton University Press

ISBN: N/A

Chapter/article title: N/A

Chapter/issue: N/A

URL: N/A

Other description: N/A

Source location: N/A

Career Ready

Career-focused: No

Work-based learning: No

Self sourced or Uni sourced: N/A

Entire subject or partial subject: N/A

Total hours/days required: N/A

Location of WBL activity (region): N/A

WBL addtional requirements: N/A

Graduate capabilities & intended learning outcomes

Graduate Capabilities

Intended Learning Outcomes

01. Justify the algorithmic requirements for secure information systems
02. Formulate a set of requirements for cybersecurity algorithms
03. Evaluate and rate a range of algorithmic solutions for a given cybersecurity problem
04. Critique cyber algorithms proposed to solve cybersecurity problems
05. Propose the ethical use of cybersecurity algorithms in a range of differing use cases
06. Analyse and predict the performance, accuracy and reliability of algorithms using real-world data

Melbourne (Bundoora), 2020, Semester 1, Day

Overview

Online enrolment: Yes

Maximum enrolment size: N/A

Subject Instance Co-ordinator: Kayes Kayes

Class requirements

Computer LaboratoryWeek: 10 - 22
One 2.00 hours computer laboratory per week on any day including weekend during the day from week 10 to week 22 and delivered via face-to-face.

LectureWeek: 10 - 22
One 2.00 hours lecture per week on any day including weekend during the day from week 10 to week 22 and delivered via face-to-face.

Assessments

Assessment elementCommentsCategoryContributionHurdle%ILO*

Written Assignment 1 (equivalent to 1000 words)Define a set of algorithmic requirements for a government medical records system

N/AN/AN/ANo20SILO1, SILO2

Written Assignment 2 (equivalent to 1000 words)Create a set of ordered steps to protect patient files in a government medical records system

N/AN/AN/ANo20SILO3, SILO4

3 hour Exam (3000 words equivalent)Predict the performance and accuracy of a proposed government medical records system

N/AN/AN/ANo60SILO1, SILO2, SILO3, SILO4, SILO5, SILO6