Effective Term: | 2024/05 |
Institute / School : | Institute of Innovation, Science & Sustainability |
Unit Title: | Introduction To Cyber Security Fundamentals and Practices |
Unit ID: | ITECH7611 |
Credit Points: | 15.00 |
Prerequisite(s): | Nil |
Co-requisite(s): | Nil |
Exclusion(s): | Nil |
ASCED: | 029901 |
Other Change: | |
Brief description of the Unit |
The explosion of information and communication technologies, systems, applications, and networks have enormous benefits to government and industry. However, there are also increasing incidents of major cyber-attacks that have numerous threats to privacy and security. In this course we will cover fundamental concepts of cyber security, risk mitigation mechanisms associated with the implementation and management of IT infrastructure. You will learn real-world applications of cyber security and a solid foundation in theory and practice to support your future career. The course aligns with requirements of the Certified Information Systems Security Professional (CISSP) certification. |
Grade Scheme: | Graded (HD, D, C, P, MF, F, XF) |
Work Experience Indicator: |
No work experience |
Placement Component: No |
Supplementary Assessment: |
Where supplementary assessment is available a student must have failed overall in the Unit but gained a final mark of 45 per cent or above, has completed all major assessment tasks (including all sub-components where a task has multiple parts) as specified in the Unit Description and is not eligible for any other form of supplementary assessment |
Course Level: |
Level of Unit in Course | AQF Level(s) of Course | 5 | 6 | 7 | 8 | 9 | 10 | Introductory | | | | | | | Intermediate | | | | |  | | Advanced | | | | | | |
|
Learning Outcomes: |
Knowledge: |
K1. | Analyse and describe the principles of information in the context of cyber security threats and attacks |
|
K2. | Investigate Internet tools used by hackers to penetrate systems and launch attacks. |
|
K3. | Differentiate and integrate legal, privacy and ethical aspects in the context of cyber security. |
|
K4. | Review basic security issues related to wired, wireless and mobile networks covering authentication, message encryption and key management. |
|
K5. | Analyse different mitigation mechanisms and prevention to determine and evaluate possible security solutions. |
|
Skills: |
S1. | Outline threats and risks from cyberspace. |
|
S2. | Appraise the encryption strength by the key size and algorithm applied. |
|
S3. | Perform the anti-malware scanning and/or intrusion detection using open source software. |
|
S4. | Utilize open-source tools to create a simple yet fully functional firewall. |
|
S5. | Compare and contrast presentations of cyber security topics. |
|
Application of knowledge and skills: |
A1. | Demonstrate initiative and judgement to adapt cyber security technologies to unique and diverse contexts. |
|
A2. | Relate and interpret emerging developments in cyber security to historical developments. |
|
Unit Content: |
Topics may include: Protecting your computer and its contents. Securing computer networks, communications and Information practices. Safe Internet usage, ethics and privacy guidelines. Fundamental of digital signatures, cryptography, physical and logical security controls. Firewalls, IDS/IPS systems, antivirus: signatures and sandboxing, and Incident response. Vulnerability and penetration testing. Telecommunications systems, network security, wireless security, host and server security. Introduction to web browser, mobile and cloud security. Operation system and software security. |
Graduate Attributes: |
Federation University recognises that students require key transferable employability skills to prepare them for their future workplace and society. FEDTASKS (Transferable Attributes Skills and Knowledge) provide a targeted focus on five key transferable Attributes, Skills, and Knowledge that are be embedded within curriculum, developed gradually towards successful measures and interlinked with cross-discipline and Co-operative Learning opportunities. One or more FEDTASK, transferable Attributes, Skills or Knowledge must be evident in the specified learning outcomes and assessment for each FedUni Unit, and all must be directly assessed in each Course.
|
FED TASK and descriptor | Development and acquisition of FEDTASKS in the Unit | Learning outcomes (KSA) | Assessment task (AT#) | FEDTASK 1 Interpersonal | Students at this level will demonstrate an advanced ability in a range of contexts to effectively communicate, interact and work with others both individually and in groups. Students will be required to display high level skills in-person and/or online in: • Using and demonstrating a high level of verbal and non-verbal communication • Demonstrating a mastery of listening for meaning and influencing via active listening • Demonstrating and showing empathy for others • High order skills in negotiating and conflict resolution skills\\ • Demonstrating mastery of working respectfully in cross-cultural and diverse teams. | K3, K4, S5 | AT1, AT2, AT3 | FEDTASK 2 Leadership | Students at this level will demonstrate a mastery in professional skills and behaviours in leading others. • Creating and sustaining a collegial environment • Demonstrating a high level of self -awareness and the ability to self-reflect and justify decisions • Inspiring and initiating opportunities to lead others • Making informed professional decisions • Demonstrating initiative in new professional situations. | Not applicable | Not applicable | FEDTASK 3 Critical Thinking and Creativity | Students at this level will demonstrate high level skills in working in complexity and ambiguity using the imagination to create new ideas. Students will be required to display skills in: • Reflecting critically to generate and consider complex ideas and concepts at an abstract level • Analysing complex and abstract ideas, concepts and information • Communicate alternative perspectives to justify complex ideas • Demonstrate a mastery of challenging conventional thinking to clarify complex concepts • Forming creative solutions in problem solving to new situations for further learning. | K1, K2, K3, K5, S2, S3, S4 | AT1, AT2, AT3 | FEDTASK 4 Digital Literacy | Students at this level will demonstrate the ability to work competently across a wide range of tools, platforms and applications to achieve a range of tasks. Students will be required to display skills in: • Mastering, exploring, evaluating, managing, curating, organising and sharing digital information professionally • Collating, managing complex data, accessing and using digital data securely • Receiving and responding professionally to messages in a range of professional digital media • Contributing competently and professionally to digital teams and working groups • Participating at a high level in digital learning opportunities. | K4, S1, A2 | AT1, AT2, AT3 | FEDTASK 5 sustainable and Ethical Mindset | Students at this level will demonstrate a mastery of considering and assessing the consequences and impact of ideas and actions in enacting professional ethical and sustainable decisions. Students will be required to display skills in: • Demonstrate informed judgment making that considers the impact of devising complex solutions in ambiguous global economic environmental and societal contexts • Professionally committing to the promulgation of social responsibility • Demonstrate the ability to evaluate ethical, socially responsible and/or sustainable challenges and generating and articulating responses • Communicating lifelong, life-wide and life-deep learning to be open to the diverse professional others • Generating, leading and implementing required actions to foster sustainability in their professional and personal life | S1 | AT1, AT2, AT3 |
|
| Learning Outcomes Assessed | Assessment Tasks | Assessment Type | Weighting | 1. | K1 - K5, S1 - S5, A1
- A2 | Participate in lectures, read and summarize conceptual and practical aspects of the course | Assignment(s) | 20% - 30% | 2. | K1 - K5, S1 - S5, A1
- A2 | Self directed initiatives aimed at producing an artifact that demonstrates skill acquisition | Assignment(s) and Presentation(s) | 30% - 50% | 3. | K1 - K5, S1 - S5, A1
- A2 | Examination(s)/Test(s) questions covering the course material, read and theoretical aspects of the course | Examination(s)/Test(s) | 30% - 40% |
|
Professional Standards / Competencies: |
| Standard / Competency | 1. | Australian Computer Society - Core Body of Knowledge: 2023 accreditation |
|
Attribute | Assessed | Level | Core ICT Knowledge | |
ICT Infrastructure
| | |
ICT hardware components and organisation: the creation, communication and processing of digital signals using sensors and activators, processors and storage
| | Yes | Introductory | | |
Network and internetwork concepts and protocols, wireless and mobile computing, cloud and distributed systems
| | Yes | Intermediate | |
Cyber Security
| | |
Nature of Cyber Security: forms of attack, prevention, detection, mitigation and repair
| | Yes | Intermediate | | |
Information assets to be secured (hardware, networks, software, data) and the different means of securing them, cryptography
| | Yes | Intermediate | | |
Human security roles and behaviours, rights and obligations (privacy)
| | No | Introductory | | |
Cyber Security risk assessment, policy, management and testing, forensics
| | Yes | Advanced | Professionalism as it applied in ICT | | Professional ICT Ethics | | |
Fundamental ethics notions (stakeholders, responsibility, harm, benefit, rights, virtues, duty, respect and consequences) and ethics theories
| | Yes | Introductory | | |
Methods of ethical reasoning, analysis and reflection, ethics canvas
| | Yes | Introductory | | |
Professional ethics issues: general professional issues such as conflict of interest, confidentiality
| | Yes | Introductory |
| 2. | Skills Framework for the Information Age (SFIA): Version 8 |
|
Attribute | Assessed | Level | Strategy and architecture | | Security and privacy | | | PEDP Personal data protection (Levels 5 - 6) Implementing and operating a framework of controls and management strategies to promote compliance with personal data legislation. | | No | 2 | | | THIN Threat intelligence (Levels 2 - 6) Developing and sharing actionable insights on current and potential security threats to the success or integrity of an organisation. | | No | 1 | | Governance, risk and compliance | | | GOVN Governance (Levels 6 - 7) Defining and operating a framework for making decisions, managing stakeholder relationships, and identifying legitimate authority. | | Yes | 3 | Delivery and operation | | Technology management | | | ITOP IT infrastructure (Levels 1 - 5) Deploying, configuring and operating IT Infrastructure. | | Yes | 2 | | | SYSP System software (Levels 3 - 5) Installing, managing, controlling, deploying and maintaining infrastructure systems software, to meet operational needs and service levels. | | Yes | 3 | | | HSIN Systems installation and removal (Levels 1 - 5) Installing and testing, or decommissioning and removing, systems or system components. | | Yes | 3 | | Service management | | | SLMO Service level management (Levels 2 - 7) Agreeing targets for service levels and assessing, monitoring, and managing the delivery of services against the targets. | | No | 1 | | Security services | | | SCAD Security operations (Levels 1 - 6) Delivering management, technical and administrative services to implement security controls and security management strategies. | | Yes | 3 | | | VUAS Vulnerability assessment (Levels 2 - 5) Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. | | Yes | 3 | | | DGFS Digital forensics (Levels 3 - 6) Recovering and investigating material found in digital devices. | | No | 2 | | | PENT Penetration testing (Levels 3 - 6) Testing the effectiveness of security controls by emulating the tools and techniques of likely attackers. | | No | 2 |
|
|