Year
2021
Units
4.5
Contact
On Campus
32 x 30-minute lecture-2s per semester
8 x 90-minute lecture-1s per semester
32 x 1-hour workshops per semester
40 x 1-hour supervised studies per semester

Distance Online
1 x 2-hour online lecture weekly
1 x 1-hour workshops weekly
1 x 2-hour supervised studies weekly
1 x 5-hour independent study weekly
Prerequisites
1 Admission into DIPDT-Diploma of Digital Technologies
1a Admission into BIT-Bachelor of Information Technology
1b Admission into UCID-Undergraduate Certificate in Industry 4.0
Must Satisfy: ((1 or 1a or 1b))
Enrolment not permitted
COMP8210 has been successfully completed
Assessment
Group report, Question sets, Written report
Topic description

The topic introduces students to the fundamentals of cybersecurity and the drivers, tools and techniques for securing an organisations' digital information assets. With a focus on securing connected organisations, the students will study the principles, standards, processes and technologies associated with networked computer systems and data communications, and the cybersecurity associated with these. This will include network design and communication, Information structures and governance, cybersecurity awareness, vulnerabilities, threats, risk assessment, and legal and ethical issues.

Educational aims

This topic aims to introduce students to the fundamentals of cybersecurity and provide a theoretical and practical foundation in network protocols, design and communication, cybersecurity awareness, vulnerabilities and threats to enable them to engage in and manage risk assessments, and understand the personnel, legal and ethical issues for their organisation.

Expected learning outcomes
On completion of this topic you will be expected to be able to:

  1. Understand the basic types of network and information structures
  2. Understand the threats and risks to information resources
  3. Explain security issues in the context of their organisation
  4. Evaluate security vulnerabilities and threats and identify appropriate controls
  5. Explain the personnel, legal and ethical implications of security in the context of their organisation