Credit points: 15

Subject outline

This subject introduces algorithmic thinking in cybersecurity. Cyber algorithms and models are required to design and implement secure systems that support Confidentiality, Integrity and Availability (CIA security triad) in a range of use cases. You will discuss how to analyse, evaluate and design new algorithms in cybersecurity using a visual modelling language. Real-world case studies from intelligence analysis, fraud, data safeguarding and secure communication will be used to illustrate how cyber algorithms and models can be applied to solve problems. This subject does not require prior knowledge of computer programming.

SchoolEngineering and Mathematical Sciences

Credit points15

Subject Co-ordinatorKayes Kayes

Available to Study Abroad/Exchange StudentsNo

Subject year levelYear Level 5 - Masters

Available as ElectiveNo

Learning ActivitiesN/A

Capstone subjectNo

Subject particulars

Subject rules

Prerequisites Must be admitted into SMCYC or SMCYL or SMCYB or must obtain subject coordinator's approval


Incompatible subjectsN/A

Equivalent subjectsN/A

Quota Management StrategyN/A

Quota-conditions or rulesN/A

Special conditionsN/A

Minimum credit point requirementN/A

Assumed knowledgeN/A

Learning resources

Nine Algorithms That Changed The Future

Resource TypeBook

Resource RequirementPrescribed

AuthorMacCormick, J.



PublisherPrinceton University Press


Chapter/article titleN/A



Other descriptionN/A

Source locationN/A

Career Ready


Work-based learningNo

Self sourced or Uni sourcedN/A

Entire subject or partial subjectN/A

Total hours/days requiredN/A

Location of WBL activity (region)N/A

WBL addtional requirementsN/A

Graduate capabilities & intended learning outcomes

Graduate Capabilities

Intended Learning Outcomes

01. Justify the algorithmic requirements for secure information systems
02. Formulate a set of requirements for cybersecurity algorithms
03. Evaluate and rate a range of algorithmic solutions for a given cybersecurity problem
04. Critique cyber algorithms proposed to solve cybersecurity problems
05. Propose the ethical use of cybersecurity algorithms in a range of differing use cases
06. Analyse and predict the performance, accuracy and reliability of algorithms using real-world data

Subject options

Select to view your study options…

Start date between: and    Key dates

Melbourne (Bundoora), 2021, Semester 1, Day


Online enrolmentYes

Maximum enrolment sizeN/A

Subject Instance Co-ordinatorKayes Kayes

Class requirements

Computer LaboratoryWeek: 10 - 22
One 2.00 hours computer laboratory per week on any day including weekend during the day from week 10 to week 22 and delivered via face-to-face.

LectureWeek: 10 - 22
One 2.00 hours lecture per week on any day including weekend during the day from week 10 to week 22 and delivered via face-to-face.


Assessment elementCommentsCategoryContributionHurdle% ILO*

Written Assignment 1 (equivalent to 1000 words) Define a set of algorithmic requirements for a government medical records system

N/AAssignmentIndividualNo20 SILO1, SILO2

Written Assignment 2 (equivalent to 1000 words) Create a set of ordered steps to protect patient files in a government medical records system

N/AAssignmentIndividualNo20 SILO3, SILO4

3 hour Exam (3000 words equivalent) Predict the performance and accuracy of a proposed government medical records system

N/ACentral examIndividualNo60 SILO1, SILO2, SILO3, SILO4, SILO5, SILO6