INSIDE THE MIND OF A HACKER

SHE5IMH

2020

Credit points: 15

Subject outline

This subject explores the motivations, mindset and techniques used by hackers. Although their activities are illicit and illegal, hackers have a finely attuned understanding of computer networks and systems and how users/customers behave in online environments. If nothing else, they have developed new - albeit illegal and unethical business models that exploit vulnerabilities in computer networks and systems. By looking at systems and practices through the eyes of a hacker, you can better identify weaknesses, emerging threats and develop more effective defences.

School: Engineering and Mathematical Sciences (Pre 2022)

Credit points: 15

Subject Co-ordinator: Alex Ng

Available to Study Abroad/Exchange Students: Yes

Subject year level: Year Level 5 - Masters

Available as Elective: No

Learning Activities: N/A

Capstone subject: No

Subject particulars

Subject rules

Prerequisites: Must be admitted into SMCYC or SMCYL or SMCYB or must obtain subject coordinator's approval

Co-requisites: N/A

Incompatible subjects: N/A

Equivalent subjects: N/A

Quota Management Strategy: N/A

Quota-conditions or rules: N/A

Special conditions: N/A

Minimum credit point requirement: N/A

Assumed knowledge: N/A

Career Ready

Career-focused: No

Work-based learning: No

Self sourced or Uni sourced: N/A

Entire subject or partial subject: N/A

Total hours/days required: N/A

Location of WBL activity (region): N/A

WBL addtional requirements: N/A

Graduate capabilities & intended learning outcomes

Graduate Capabilities

Intended Learning Outcomes

01. Critically analyse typologies of hackers, their mindsets and the motivations behind hacking.
02. Critically analyse the various tactics that hackers use in breaching communication networks.
03. Deconstruct and critically analyse the profit models and value chain behind hackers' activities.
04. Critically evaluate standard business security practices from the viewpoint of a hacker.
05. Recommend processes and practices to reduce the likelihood of data breaches.

Melbourne (Bundoora), 2020, Semester 1, Day

Overview

Online enrolment: Yes

Maximum enrolment size: N/A

Subject Instance Co-ordinator: Alex Ng

Class requirements

Computer LaboratoryWeek: 10 - 22
One 2.00 hours computer laboratory per week on any day including weekend during the day from week 10 to week 22 and delivered via face-to-face.

LectureWeek: 10 - 22
One 2.00 hours lecture per week on any day including weekend during the day from week 10 to week 22 and delivered via face-to-face.

Assessments

Assessment elementCommentsCategoryContributionHurdle%ILO*

2 hour Exam (equiv to 2000 words)Students undertake an audit of an organisation and suggest ways in which organisations might be hacked.

N/AN/AN/ANo40SILO1, SILO2, SILO3, SILO4, SILO5

Defensive security report (equiv to 1500 words)Students undertake an audit of an organisation and suggest ways in which organisations can be defended from hacks.

N/AN/AN/ANo30SILO1, SILO2, SILO3, SILO4, SILO5

Online profile report (equiv to 1000 words)Students research their own online footprint and determine ways in which that can be exploited.

N/AN/AN/ANo20SILO1, SILO2, SILO4, SILO5

6 x 5 min online quizzes (equiv to 500 words)Best of 5 quiz results taken. Each quiz worth 2% each.

N/AN/AN/ANo10SILO1, SILO2