BN223 - Cyber Security Principles

Credit Points: 15 credit points

Workload: 48 hours

Prerequisite: BN200 Network Security Fundamentals

Co-requisite: N/A

Aims & Objectives

This is an elective unit out of a total of 24 units in the Bachelor of Networking (BNet). This unit addresses the BNet course learning outcomes and complements other courses in a related field by developing students’ specialised knowledge of cyber security solutions based on tools and technologies. For further course information refer to: http://www.mit.edu.au/study-with-us/programs/bachelor-networking. This unit is part of the AQF level 7 (BNet). Course.

Students will be able to provide security solutions to the business with in-depth knowledge of cyber threats and its corresponding security protocols. Students will also be able to provide security solutions to the business with in-depth knowledge of cyber threats and its corresponding security protocols. Students will also be able to plan and implement operational assurance program for enterprise information infrastructure. 

This unit will cover the following topics:

  • Security fundamentals, threats and attacks
  • Common Security Countermeasures
  • Managing security programs and compliance
  • Detecting and Controlling Malicious Insiders
  • Managing security programs

Learning Outcomes

4.1 Course Learning Outcomes
The Course learning outcomes applicable to this unit are listed on the Melbourne Institute of Technology’s website: www.mit.edu.au 

4.2 Unit Learning Outcomes
At the completion of this unit students should be able to:
a. Understand the common types of threat and vulnerabilities to cyber systems and data
b. Discuss the design and secure solutions for organisations in socio-technical context
c. Demonstrate an understanding of the tactical and strategic means of detecting and monitoring anomalous activity
d. Understand physical security impacts on the enterprise information infrastructure
e. Plan and implement operational assurance programs 

Weekly Topics

This unit will cover the content below:

Week Topics
1 Introduction to Cyber Security
2 Threats and Countermeasures in Digital Crime and Cyber Terrorism
3 Standard Process Models to Secure Information and Communications Technology
4 Planning for Security
5 Socio-technical context, Risk Management
6 Security Technology: Firewalls, VPNs, and Wireless
7 Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools, In-Class Test
8 Data Security and Physical Security
9 Implementing Information Security
10 Insider Threats: Detecting and Controlling Malicious Insiders
11 System and Application Security
12 Review

Assessment

Assessment Task Due Date A B Learning Outcomes Assessed
Formative Assignment 1 Week 3 (10/04/2022) 5%   a
In-Class Test Week 7 (03/05/2022)   10% a-b
Assignment 2 Week 11 (01/06/2022) 25%   a-d
Laboratory and Problem Based Learning participation & submission Week 2 – 11 (08/06/2022) 10%   a-e
Final Examination (3 hours)     50% a-e
TOTALS   40% 60%  

Task Type: Type A: unsupervised, Type B: supervised.

Contribution and participation 

This unit has class participation and student contribution as an assessment. The assessment task and marking rubric will follow the Guidelines on Assessing Class Participation (https://www.mit.edu.au/about-us/governance/institute-rules-policies-andplans/policies-procedures-and-guidelines/Guidelines_on_Assessing_Class_Participation). Further details will be provided in the assessment specification on the type of assessment tasks and the marking rubrics.

Presentations (if applicable)
For presentations conducted in class, students are required to wear business attire.

Textbook and Reference Materials

Textbook: 

  • M. E. Whitman, H. J. Mattord, Principles of Information Security, Cengage, USA, 6th Ed., 2018
  • M. Dawson, M. Omar, New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1st ed., IGI Global, USA, 2015

References:

  • D. Shoemaker, K. Singler, Cybersecurity: Engineering a Secure Information Technology Organization, 1st ed., Cengage Learning, USA, 2015
  • D. Shoemaker, K. Singler, Cybersecurity: The Essential Body of Knowledge, 1st ed., Cengage Learning, 2012
  • D. Sutton, Cyber Security: A Practitioner’s Guide, BSC Learning and Development Ltd, UK, 2017
  • S. Ali, T. A. Balushi, Z. Nadir, O. K. Hussain, Cyber Security for Cyber Physical Systems, Springers, Australia, 2018
  • R. J. Robinson, Introduction to Blockchain Cyber Security, Kindle ed., 2016
  • Dehghantanha,‎ M. Conti,‎ T. Dargahi, Cyber Threat Intelligence, Springers, 1st Ed., 2018

Journals

Adopted Reference Style: IEEE

Graduate Attributes

MIT is committed to ensure the course is current, practical and relevant so that graduates are “work ready” and equipped for life-long learning. In order to accomplish this, the MIT Graduate Attributes identify the required knowledge, skills and attributes that prepare students for the industry.
The level to which Graduate Attributes covered in this unit are as follows:

Ability to communicate Independent and Lifelong Learning Ethics Analytical and Problem Solving Cultural and Global Awareness Team work Specialist knowledge of a field of study

Legend

Levels of attainment Extent covered
The attribute is covered by theory and practice, and addressed by assessed activities in which the students always play an active role, e.g. workshops, lab submissions, assignments, demonstrations, tests, examinations.
The attribute is covered by theory or practice, and addressed by assessed activities in which the students mostly play an active role, e.g. discussions, reading, intepreting documents, tests, examinations.
The attribute is discussed in theory or practice; it is addressed by assessed activities in which the students may play an active role, e.g. lectures and discussions, reading, interpretation, workshops, presentations.
The attribute is presented as a side issue in theory or practice; it is not specifically assessed, but it is addressed by activities such as lectures or tutorials.
The attribute is not considered, there is no theory or practice or activities associated with this attribute.