Skip to the content | Change text size
PDF unit guide

FIT5163 Information and computer security - Semester 2, 2012

This unit provides students with in depth coverage of a range of security problems in information systems, namely physical security, network security and software security. Within these areas, topics covered include risk analysis, authentication, access control, and a range of cryptographic techniques. It looks at various management issues, including use and abuse of encryption, distributed systems authentication, contingency planning, auditing, logging and integrity management. A range of security applications are used as examples.

Mode of Delivery

Caulfield (Day)

Contact Hours

2 hrs lectures/wk, 2 hrs tutorials/wk

Workload

Student workload commitments per week are:

  • two-hour lecture and
  • two-hour tutorial (requiring advance preparation)
  • a minimum of 2-3 hours of personal study per one hour of contact time in order to satisfy the reading and assessment expectations.

Unit Relationships

Prohibitions

FIT4016, CSE4892

Prerequisites

Introductory knowledge of computing at the undergraduate level is assumed.

Chief Examiner

Campus Lecturer

Caulfield

Nandita Bhattacharjee

Academic Overview

Outcomes

At the completion of this unit students will:
  • have knowledge of risks, threats and the goals of information security;
  • understand various controls and their effectiveness for information security in an organisation;
  • be able to evaluate the effectiveness (both in terms of performance and limitations) of individual control techniques;
  • match the risk against controls and evaluate their applicability.

Graduate Attributes

Monash prepares its graduates to be:
  1. responsible and effective global citizens who:
    1. engage in an internationalised world
    2. exhibit cross-cultural competence
    3. demonstrate ethical values
  2. critical and creative scholars who:
    1. produce innovative solutions to problems
    2. apply research skills to a range of challenges
    3. communicate perceptively and effectively

Assessment Summary

Examination (3 hours): 60%; In-semester assessment: 40%

Assessment Task Value Due Date
Class tests 20% 15 August 2012, 12 September 2012, 17 October 2012 in Lectures
Group assignment - Biometrics in Cryptography 20% (Report 14%, Presentation 6%) Report due 5 October 2012, Presentations due Week 11 Tutorial
Examination 1 60% To be advised

Teaching Approach

Lecture and tutorials or problem classes
This teaching and learning approach provides facilitated learning, practical exploration and peer learning.

Feedback

Our feedback to You

Types of feedback you can expect to receive in this unit are:
  • Informal feedback on progress in labs/tutes
  • Test results and feedback
  • Other: Answers to discussion sheets & individual student meetings

Your feedback to Us

Monash is committed to excellence in education and regularly seeks feedback from students, employers and staff. One of the key formal ways students have to provide feedback is through SETU, Student Evaluation of Teacher and Unit. The University's student evaluation policy requires that every unit is evaluated each year. Students are strongly encouraged to complete the surveys. The feedback is anonymous and provides the Faculty with evidence of aspects that students are satisfied and areas for improvement.

For more information on Monash's educational strategy, and on student evaluations, see:
http://www.monash.edu.au/about/monash-directions/directions.html
http://www.policy.monash.edu/policy-bank/academic/education/quality/student-evaluation-policy.html

Previous Student Evaluations of this unit

Students were very happy with the unit overall. Student feedback highlighted the following strengths:

  • intellectually stimulating
  • regular useful feedback
  • tutorials and laboratory tasks
  • assessments and assessment strategies
  • active participation

This feedback can be used to strengthen the learning outcomes further by increasing the depth of some topics in cryptography.

If you wish to view how previous students rated this unit, please go to
https://emuapps.monash.edu.au/unitevaluations/index.jsp

Unit Schedule

Week Activities Assessment
0   No formal assessment or activities are undertaken in week 0
1 Introduction to information security  
2 Principles of encryption  
3 Cryptography I  
4 Cryptography II Class test 1 in Lecture 15 August 2012
5 Authentication  
6 Access control  
7 Introduction to number theory  
8 Public key cryptography Class test 2 in Lecture 12 September 2012
9 Biometrics  
10 Integrity & non-repudiation Assignment Report due 5 October 2012
11 Key management & distributed authentication Assignment Presentation Week 11 Tutorial
12 Software security Class test 3 in Lecture 17 October 2012
  SWOT VAC No formal assessment is undertaken SWOT VAC
  Examination period LINK to Assessment Policy: http://policy.monash.edu.au/policy-bank/
academic/education/assessment/
assessment-in-coursework-policy.html

*Unit Schedule details will be maintained and communicated to you via your MUSO (Blackboard or Moodle) learning system.

Assessment Requirements

Assessment Policy

Faculty Policy - Unit Assessment Hurdles (http://www.infotech.monash.edu.au/resources/staff/edgov/policies/assessment-examinations/unit-assessment-hurdles.html)

Academic Integrity - Please see the Demystifying Citing and Referencing tutorial at http://lib.monash.edu/tutorials/citing/

Assessment Tasks

Participation

  • Assessment task 1
    Title:
    Class tests
    Description:
    Three Class tests will be conducted on the topics covered in this unit.  They will be held during lectures.  Each Class test will have a weighting of 10%.  The best two scores will added to an assessment total of 20%.
    Weighting:
    20%
    Criteria for assessment:

    Quality of answers in response to test questions.

    How well understanding of lecture material covered is demonstrated.

    Due date:
    15 August 2012, 12 September 2012, 17 October 2012 in Lectures
  • Assessment task 2
    Title:
    Group assignment - Biometrics in Cryptography
    Description:
    In this assignment students will be working in groups of two or three members. This assignment explores how the iris image of an individual can be used to generate the key for private key cryptography. In other words, we would like to integrate the biometric, in this case the iris with cryptography so that security of the system authentication as well as information security can be achieved.

    Details of the tasks will be provided in the assignment handout. A comprehensive report is due in Week 10. Students presentations on the assignment is due in Week 11.
    Weighting:
    20% (Report 14%, Presentation 6%)
    Criteria for assessment:

    How well understanding of the allocated task is demonstrated.

    Each student completes an allocated task that contributes to the final report, and receives marks for that task. Students will give individual presentations of their allocated task. Peer review will assess peer learning and peer support.

    Due date:
    Report due 5 October 2012, Presentations due Week 11 Tutorial

Examinations

  • Examination 1
    Weighting:
    60%
    Length:
    3 hours
    Type (open/closed book):
    Closed book
    Electronic devices allowed in the exam:
    None

Assignment submission

It is a University requirement (http://www.policy.monash.edu/policy-bank/academic/education/conduct/plagiarism-procedures.html) for students to submit an assignment coversheet for each assessment item. Faculty Assignment coversheets can be found at http://www.infotech.monash.edu.au/resources/student/forms/. Please check with your Lecturer on the submission method for your assignment coversheet (e.g. attach a file to the online assignment submission, hand-in a hard copy, or use an online quiz).

Online submission

If Electronic Submission has been approved for your unit, please submit your work via the VLE site for this unit, which you can access via links in the my.monash portal.

Extensions and penalties

Returning assignments

Other Information

Policies

Student services

The University provides many different kinds of support services for you. Contact your tutor if you need advice and see the range of services available at www.monash.edu.au/students. For Sunway see http://www.monash.edu.my/Student-services, and for South Africa see http://www.monash.ac.za/current/

The Monash University Library provides a range of services and resources that enable you to save time and be more effective in your learning and research. Go to http://www.lib.monash.edu.au or the library tab in my.monash portal for more information. At Sunway, visit the Library and Learning Commons at http://www.lib.monash.edu.my/. At South Africa visit http://www.lib.monash.ac.za/.

Academic support services may be available for students who have a disability or medical condition. Registration with the Disability Liaison Unit is required. Further information is available as follows:

  • Website: http://monash.edu/equity-diversity/disability/index.html;
  • Email: dlu@monash.edu
  • Drop In: Equity and Diversity Centre, Level 1 Gallery Building (Building 55), Monash University, Clayton Campus, or Student Community Services Department, Level 2, Building 2, Monash University, Sunway Campus
  • Telephone: 03 9905 5704, or contact the Student Advisor, Student Commuity Services at 03 55146018 at Sunway

Reading list

  1. Cryptography and Network Security: Principles and Practice. William Stallings, Fifth Edition, 2011. Prentice Hall.
  2. Computer Security: Principles and Practice William Stallings and Lawrie Brown, 2012, Prentice Hall.
  3. Security Engineering: A guide to building dependable distributed systems. Ross J. Anderson, Second Edition, 2008, John Wiley & Sons, Inc.