MN522 - Information Security

Credit points: 20 credit points

Workload: 60 hours

Prerequisite: N/A

Co-requisite: N/A

Aims & objectives

This is a core unit out of a total of 6 units in the Graduate Diploma of Networking (GDNet) and 12 units in Master of Networking (MNet). This unit addresses the course learning outcomes and complements other courses in a related field by developing students’ specialised knowledge in network security and applying critical skills in Information Technology. For further course information refer to: http://www.mit.edu.au/study-with-us/programs/master-networking, http://www.mit.edu.au/study-with-us/programs/master-engineering-telecommunications and http://www.mit.edu.au/study-with-us/programs/graduate-diploma-networking. This unit is part of the AQF Level 8 (GDNet) and level 9 (MNet and MEng(Tel)) courses.
This unit provides students with a comprehensive overview of the field of network security, security risks and countermeasures associated with network connectivity. Students will gain knowledge and skills to understand, apply and manage network security. There are some activities designed to develop students’ abilities to protect network data that include protecting the usability, reliability, integrity, and safety of network and data. 
The unit will help students to identify, analyse, and compare common security vulnerabilities, threats and in depth analysis of these threats that network users often face. It will help students to respond to and recover from security incidents through case studies/workshops.

The unit will cover the following areas:

  • Introduction of Network Security
  • Symmetric and Asymmetric Encryption Techniques
  • Authentication
  • Transport Level and IP Security
  • Intruders and Malicious Software
  • Firewalls
  • Case Studies
     

Learning outcomes

At the completion of this unit students should be able to:

  • Analyse and discuss the main security issues and emerging trends in information security;
  • Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems;
  • Explain the major methodologies for secure networks and what threats they address;
  • Identify and report network threats, select and implement appropriate countermeasures for network security;
  • Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization;
  • Demonstrate professional and ethical behaviour with regard to network security.
     

Weekly topics

This unit will cover the content below:

Week # Lecture Topic Laboratory Topics
1 Lecture 1 Introduction to Security Laboratory 1 Introduction to Security
2 Lecture 2 Necessity of Information Security Laboratory 2 Introduction to Security
3 Lecture 3 Authentication, Access Control, and Cryptography Laboratory 3 Unix Operating System Basic Commands
4 Lecture 4 Malware and Attacks – The Internet (User Side)  
5 Lecture 5 Malware and Attacks – Operating System Laboratory 5 In-Class Test
6 Lecture 6 Malware and Attacks: Network  
7 Lecture 7 Security Countermeasures  
8 Lecture 8 Cryptography  
9 Lecture 9 Management and Incidents  
10 Lecture 10 Legal Issues and Ethics  
11 Lecture 11 AI and Cybersecurity  
12 Lecture 12 Forensic Principals and Review  

Assessment

Assessment Task Due Date A B Learning Outcomes Assessed
Assessment 1 Individual -Formative Week 3 10%   a
Assessment 2 - In-class test (On Campus, Face to Face) Week 5   10% a-b
Assessment 3 - Group Week 11 20%   c-e
Assessment 4 - Class Participation and Contribution Week 2-11 10%   a-e
Final Examination (3 hours)     50% a-e
TOTALS   40% 60%  

Task Type: Type A: unsupervised, Type B: supervised

Contribution and participation (10%)
This unit has class participation as an assessment. The assessment task and marking rubric will follow the Guidelines on Assessing Class Participation (https://www.mit.edu.au/about-us/governance/institute-rules- policies-and-plans/policies-procedures-and-guidelines/Guidelines_on_Assessing_Class_Participation). Further details will be provided in the assessment specification on the type of assessment tasks and the marking rubrics.

Textbook and reference materials

Note: Students are required to purchase the prescribed textbook and have it available each week in class.
Textbook:

  • C. Pfleeger, S. L. Pfleeger, L. Coles-Kemp, Security in Computing, 6th edition, Wesley Professional, August 2023

References:

  • M. E. Whitman, H. J. Mattord, Principles of Information Security, 7th Edition, Cengage. June 2021
  • M.Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition, Cengage, December 2020
  • M.Ciampa, Security Awareness: Applying Practical Cybersecurity in Your World, 6th Edition, Cengage, January 2023

Adopted Reference Style: IEEE
 

Graduate attributes

MIT is committed to ensure the course is current, practical and relevant so that graduates are “work ready” and equipped for life-long learning. In order to accomplish this, the MIT Graduate Attributes identify the required knowledge, skills and attributes that prepare students for the industry.
The level to which Graduate Attributes covered in this unit are as follows:

Ability to communicate Independent and lifelong learning Ethics Analytical and problem solving Cultural and global awareness Team work Specialist knowledge of a field of study

Legend

Levels of attainment Extent covered
The attribute is covered by theory and practice, and addressed by assessed activities in which the students always play an active role, e.g. workshops, lab submissions, assignments, demonstrations, tests, examinations.
The attribute is covered by theory or practice, and addressed by assessed activities in which the students mostly play an active role, e.g. discussions, reading, intepreting documents, tests, examinations.
The attribute is discussed in theory or practice; it is addressed by assessed activities in which the students may play an active role, e.g. lectures and discussions, reading, interpretation, workshops, presentations.
The attribute is presented as a side issue in theory or practice; it is not specifically assessed, but it is addressed by activities such as lectures or tutorials.
The attribute is not considered, there is no theory or practice or activities associated with this attribute.