Effective Term: | 2024/05 |
Institute / School : | Institute of Innovation, Science & Sustainability |
Unit Title: | Data Analytics for Cyber Threat Intelligence |
Unit ID: | ITECH7614 |
Credit Points: | 15.00 |
Prerequisite(s): | (ITECH5104 or ITECH7611) |
Co-requisite(s): | Nil |
Exclusion(s): | Nil |
ASCED: | 019903 |
Other Change: | |
Brief description of the Unit |
Security operations today involve massive cyberspace data, which includes not only networking data such as TCP/IP packet, system logs, URLs, HTML scripts, and Darknet traffic, but also data from e-commerce, m-commerce, e-mail and social media data such as facebook, Linkedin and Twitter data. This unit focuses on structured analysis in order to amplify existing cyber threat analytics skills with machine learning, natural language processing, data mining, and other artificial intelligence techniques. |
Grade Scheme: | Graded (HD, D, C, P, MF, F, XF) |
Work Experience Indicator: |
No work experience |
Placement Component: | |
Supplementary Assessment:No |
Supplementary assessment is not available to students who gain a fail in this Unit. |
Course Level: |
Level of Unit in Course | AQF Level(s) of Course | 5 | 6 | 7 | 8 | 9 | 10 | Introductory | | | | | | | Intermediate | | | | | | | Advanced | | | | |  | |
|
Learning Outcomes: |
Knowledge: |
K1. | Articulate the importance and privacy and ethical implications of cyber data analytics for threat detection, incident response and prevention. |
|
K2. | Investigate information from domains, external datasets, transport layer security/secure sockets layer certificates. |
|
K3. | Discuss the implementation of cyber space intelligence through clustering, classification, prediction and association rule mining. |
|
K4. | Explore the usages of open-source and proprietary tools for computational cyber space data analytics. |
|
K5. | Evaluate computational data analytic skills in tactical and operational level of threat detection intelligence. |
|
Skills: |
S1. | Identify and create intelligence requirements through practices such as threat modeling. |
|
S2. | Discover the different sources in cyber space to integrate adversary data for incident analytics. |
|
S3. | Develop threat intelligence to detect, forecast, and respond to targeted attacker or victim. |
|
S4. | Generate association rules to help with incident response and security operations. |
|
S5. | Apply system logs filtering to identify abnormal usage of system resources. |
|
Application of knowledge and skills: |
A1. | Apply initiative and judgment to adapt algorithms to diverse contexts of cyber risks. |
|
A2. | Research and interpret appropriate solution developments for cyber security. |
|
Unit Content: |
Harvest multiple source cyber space data Filter system logs and detect compromise using key Windows events Identify internal pivoting activity using system logs Apply long tail analysis to identify abnormal program usage Automatic threat Intelligence extraction from unstructured sources Phishing Identification in social media and other platforms Vulnerability exploit prediction Cyber event forecasting by discovering signals from web Automatic identification of indicators of compromise Characterizing activity on the dark web Incident response facilitation using automatic text processing |
Graduate Attributes: |
Federation University recognises that students require key transferable employability skills to prepare them for their future workplace and society. FEDTASKS (Transferable Attributes Skills and Knowledge) provide a targeted focus on five key transferable Attributes, Skills, and Knowledge that are be embedded within curriculum, developed gradually towards successful measures and interlinked with cross-discipline and Co-operative Learning opportunities. One or more FEDTASK, transferable Attributes, Skills or Knowledge must be evident in the specified learning outcomes and assessment for each FedUni Unit, and all must be directly assessed in each Course.
|
FED TASK and descriptor | Development and acquisition of FEDTASKS in the Unit | Learning outcomes (KSA) | Assessment task (AT#) | FEDTASK 1 Interpersonal | Students at this level will demonstrate an advanced ability in a range of contexts to effectively communicate, interact and work with others both individually and in groups. Students will be required to display high level skills in-person and/or online in: • Using and demonstrating a high level of verbal and non-verbal communication • Demonstrating a mastery of listening for meaning and influencing via active listening • Demonstrating and showing empathy for others • High order skills in negotiating and conflict resolution skills\\ • Demonstrating mastery of working respectfully in cross-cultural and diverse teams. | Not applicable | Not applicable | FEDTASK 2 Leadership | Students at this level will demonstrate a mastery in professional skills and behaviours in leading others. • Creating and sustaining a collegial environment • Demonstrating a high level of self -awareness and the ability to self-reflect and justify decisions • Inspiring and initiating opportunities to lead others • Making informed professional decisions • Demonstrating initiative in new professional situations. | A1 | AT1, AT2, AT3 | FEDTASK 3 Critical Thinking and Creativity | Students at this level will demonstrate high level skills in working in complexity and ambiguity using the imagination to create new ideas. Students will be required to display skills in: • Reflecting critically to generate and consider complex ideas and concepts at an abstract level • Analysing complex and abstract ideas, concepts and information • Communicate alternative perspectives to justify complex ideas • Demonstrate a mastery of challenging conventional thinking to clarify complex concepts • Forming creative solutions in problem solving to new situations for further learning. | A1 | AT1, AT2, AT3 | FEDTASK 4 Digital Literacy | Students at this level will demonstrate the ability to work competently across a wide range of tools, platforms and applications to achieve a range of tasks. Students will be required to display skills in: • Mastering, exploring, evaluating, managing, curating, organising and sharing digital information professionally • Collating, managing complex data, accessing and using digital data securely • Receiving and responding professionally to messages in a range of professional digital media • Contributing competently and professionally to digital teams and working groups • Participating at a high level in digital learning opportunities. | K2 | AT1, AT2 | FEDTASK 5 sustainable and Ethical Mindset | Students at this level will demonstrate a mastery of considering and assessing the consequences and impact of ideas and actions in enacting professional ethical and sustainable decisions. Students will be required to display skills in: • Demonstrate informed judgment making that considers the impact of devising complex solutions in ambiguous global economic environmental and societal contexts • Professionally committing to the promulgation of social responsibility • Demonstrate the ability to evaluate ethical, socially responsible and/or sustainable challenges and generating and articulating responses • Communicating lifelong, life-wide and life-deep learning to be open to the diverse professional others • Generating, leading and implementing required actions to foster sustainability in their professional and personal life | S4, A1 | AT1, AT2, AT3 |
|
| Learning Outcomes Assessed | Assessment Tasks | Assessment Type | Weighting | 1. | K1 - K5, S1 - S5, A1 - A2 | Participate in lectures and labs/tutorials, read and summarise theoretical and practical aspects of the unit. | Assignment(s) | 20% - 30% | 2. | K1 - K5, S1 - S5, A1 - A2 | Develop skills in the analysis and practical application of content introduced. | Project and Presentation(s) | 30% - 50% | 3. | K1 - K5, S1 - S5, A1 - A2 | Study course material, read and summarise theoretical aspects of the unit | Test/Examination(s) | 30% - 40% |
|
Professional Standards / Competencies: |
| Standard / Competency | 1. | Australian Computer Society - Core Body of Knowledge: 2023 accreditation |
|
Attribute | Assessed | Level | Core ICT Knowledge | |
ICT Fundamentals
| | |
Information processing in humans and machines, artificial intelligence
| | Yes | Introductory | |
Information & Data Science and Engineering
| | |
Data Science and Engineering, data analytics, mining and visualisation, big data
| | Yes | Intermediate | |
Cyber Security
| | |
Nature of Cyber Security: forms of attack, prevention, detection, mitigation and repair
| | Yes | Intermediate | | |
Information assets to be secured (hardware, networks, software, data) and the different means of securing them, cryptography
| | Yes | Advanced | Professionalism as it applied in ICT | | Professional ICT Ethics | | |
ICT specific ethics issues: adverse stakeholder impacts of ICT, surveillance and privacy, data matching, autonomous computing, digital divide, etc.
| | Yes | Introductory | |
Impacts of ICT
| | |
Impacts of ICT on society (cyber warfare; surveillance, privacy and civil liberties, cybercrime and hacking, digital divide, technology reliance, intellectual property and legal issues)
| | Yes | Advanced |
| 2. | Skills Framework for the Information Age (SFIA): Version 8 |
|
Attribute | Assessed | Level | Strategy and architecture | | Security and privacy | | | INAS Information assurance (Levels 3 - 7) Protecting against and managing risks related to the use, storage and transmission of data and information systems. | | No | 1 | | | PEDP Personal data protection (Levels 5 - 6) Implementing and operating a framework of controls and management strategies to promote compliance with personal data legislation. | | No | 1 | | | THIN Threat intelligence (Levels 2 - 6) Developing and sharing actionable insights on current and potential security threats to the success or integrity of an organisation. | | Yes | 3 | | Governance, risk and compliance | | | GOVN Governance (Levels 6 - 7) Defining and operating a framework for making decisions, managing stakeholder relationships, and identifying legitimate authority. | | Yes | 2 | Change and transformation | | Change planning | | | OCDV Organisational capability development (Levels 5 - 7) Providing leadership, advice and implementation support to assess organisational capabilities and to identify, prioritise and implement improvements. | | No | 2 | Development and implementation | | Systems development | | | PROG Programming/software development (Levels 2 - 6) Developing software components to deliver value to stakeholders. | | No | 2 | | Data and analytics | | | DTAN Data modelling and design (Levels 2 - 5) Developing models and diagrams to represent and communicate data requirements and data assets. | | Yes | 3 | | | DATS Data science (Levels 2 - 7) Applying mathematics, statistics, data mining and predictive modelling techniques to gain insights, predict behaviours and generate value from data. | | Yes | 3 | Delivery and operation | | Service management | | | USUP Incident management (Levels 2 - 5) Coordinating responses to incident reports, minimising negative impacts and restoring service as quickly as possible. | | Yes | 1 | | Security services | | | VUAS Vulnerability assessment (Levels 2 - 5) Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. | | No | 1 | | | PENT Penetration testing (Levels 3 - 6) Testing the effectiveness of security controls by emulating the tools and techniques of likely attackers. | | No | 1 |
|
|