Year
2019
Units
4.5
Contact
1 x 2-hour lecture weekly
1 x 1-hour workshop weekly
Prerequisites
1 Admission into MIT-Master of Information Technology
2 36 units of topics
3 Admission into MSCCS-Master of Science (Computer Science)
3a Admission into MITNCS-Master of Information Technology (Network and Cybersecurity Systems)
3b Admission into GDPCSC-Graduate Diploma in Computer Science
3c Admission into MCS-Master of Computer Science
3d Admission into MCSAI-Master of Computer Science (Artificial Intelligence)
3e Admission into MDSC-Master of Data Science
Must Satisfy: ((1 and 2) or ((3 or 3a or 3b or 3c or 3d or 3e)))
Enrolment not permitted
1 of COMP3721, COMP8721 has been successfully completed
Topic description
The topic is concerned with the management and security of information and computer infrastructure. Areas covered include: strategic information systems, system integration issues, change and migration, risk management, security planning, disaster recovery planning, security auditing, information security, physical security, personnel security, operations security, communications security, cryptography, computer forensics, legal and ethical issues. Recent publications in the area will be reviewed.
Educational aims
The topic provides an overview of the issues associated with managing and securing the information technology infrastructure of an Enterprise. Contemporary techniques and technologies are highlighted. It improves student skills in preparing and presenting technical reports on aspects of information management and computer security.
Expected learning outcomes
At the completion of the topic, students are expected to be able to:
  1. Understand the purpose and context of a range of typical business information systems
  2. Understand the importance of securing the information of an organisation
  3. Recognise the security issues associated with the integration of various information systems within an enterprise
  4. Understand the principles of computer security
  5. Analyse security risks and prepare information and computer security plans
  6. Prepare and present consultant's reports on aspects of computer security
  7. Critically analyse publications in the area of computer security