[an error occurred while processing this directive]
[an error occurred while processing this directive]This unit provides students with in depth coverage of a range of security problems in information systems, namely physical security, network security and software security. Within these areas, topics covered include risk analysis, authentication, access control, and a range of cryptographic techniques. It looks at various management issues, including use and abuse of encryption, distributed systems authentication, contingency planning, auditing, logging and integrity management. A range of security applications are used as examples.
2 hrs lectures/wk, 2 hrs tutorials/wk
Student workload commitments per week are:
FIT4016, CSE4892
Introductory knowledge of computing at the undergraduate level is assumed.
Nandita Bhattacharjee
At the completion of this unit students will:
Examination (3 hours): 60%; In-semester assessment: 40%
Assessment Task | Value | Due Date |
---|---|---|
Class tests | 20% | 15 August 2011, 12 September 2011, 17 October 2011 in Lectures |
Group assignment - Biometrics in Cryptography | 20% (Report 14%, Presentation 6%) | Report due 7 October 2011, Presentations due Week 11 Tutorial |
Examination 1 | 60% | To be advised |
Monash is committed to excellence in education and regularly seeks feedback from students, employers and staff. One of the key formal ways students have to provide feedback is through SETU, Student Evaluation of Teacher and Unit. The University's student evaluation policy requires that every unit is evaluated each year. Students are strongly encouraged to complete the surveys. The feedback is anonymous and provides the Faculty with evidence of aspects that students are satisfied and areas for improvement.
For more information on Monash's educational strategy, and on student evaluations, see:
http://www.monash.edu.au/about/monash-directions/directions.html
http://www.policy.monash.edu/policy-bank/academic/education/quality/student-evaluation-policy.html
If you wish to view how previous students rated this unit, please go to
https://emuapps.monash.edu.au/unitevaluations/index.jsp
Week | Activities | Assessment |
---|---|---|
0 | No formal assessment or activities are undertaken in week 0 | |
1 | Introduction to information security | |
2 | Principles of encryption | |
3 | Cryptography I | |
4 | Cryptography II | Class test 1 in Lecture 15 August 2011 |
5 | Authentication | |
6 | Access control | |
7 | Introduction to number theory | |
8 | Public key cryptography | Class test 2 in Lecture 12 September 2011 |
9 | Biometrics | |
10 | Integrity & non-repudiation | Assignment Report due 7 October 2011 |
11 | Key management & distributed authentication | Assignment Presentation Week 11 Tutorial |
12 | Software security | Class test 3 in Lecture 17 October 2011 |
SWOT VAC | No formal assessment is undertaken SWOT VAC | |
Examination period | LINK to Assessment Policy: http://policy.monash.edu.au/policy-bank/ academic/education/assessment/ assessment-in-coursework-policy.html |
*Unit Schedule details will be maintained and communicated to you via your MUSO (Blackboard or Moodle) learning system.
To pass a unit which includes an examination as part of the assessment a student must obtain:
If a student does not achieve 40% or more in the unit examination or the unit non-examination total assessment, and the total mark for the unit is greater than 50% then a mark of no greater than 49-N will be recorded for the unit
Quality of answers in response to test questions.
How well understanding of lecture material covered is demonstrated.
How well understanding of the allocated task is demonstrated.
Each student completes an allocated task that contributes to the final report, and receives marks for that task. Students will give individual presentations of their allocated task. Peer review will assess peer learning and peer support.
It is a University requirement (http://www.policy.monash.edu/policy-bank/academic/education/conduct/plagiarism-procedures.html) for students to submit an assignment coversheet for each assessment item. Faculty Assignment coversheets can be found at http://www.infotech.monash.edu.au/resources/student/forms/. Please check with your Lecturer on the submission method for your assignment coversheet (e.g. attach a file to the online assignment submission, hand-in a hard copy, or use an online quiz).
Submission must be made by the due date otherwise penalties will be enforced.
You must negotiate any extensions formally with your campus unit leader via the in-semester special consideration process: http://www.infotech.monash.edu.au/resources/student/equity/special-consideration.html.
Monash has educational policies, procedures and guidelines, which are designed to ensure that staff and students are aware of the University's academic standards, and to provide advice on how they might uphold them.
You can find Monash's Education Policies at:
http://policy.monash.edu.au/policy-bank/academic/education/index.html
Key educational policies include:
The University provides many different kinds of support services for you. Contact your tutor if you need advice and see the range of services available at www.monash.edu.au/students The Monash University Library provides a range of services and resources that enable you to save time and be more effective in your learning and research. Go to http://www.lib.monash.edu.au or the library tab in my.monash portal for more information. Students who have a disability or medical condition are welcome to contact the Disability Liaison Unit to discuss academic support services. Disability Liaison Officers (DLOs) visit all Victorian campuses on a regular basis
Reading list
Cryptography and Network Security: Principles and Practice. William Stallings, Fifth Edition, 2011. Prentice Hall.
Computer Security: Principles and Practice William Stallings and Lawrie Brown, 2008, Prentice Hall.
Security Engineering: A guide to building dependable distributed systems. Ross J. Anderson, Second Edition, 2008, John Wiley & Sons, Inc.