[an error occurred while processing this directive]
[an error occurred while processing this directive]This unit will provide students with an understanding of: OSI security architecture; common information risks and requirements; operation of encryption techniques; digital signatures; public key infrastructure; authentication and non-repudiation; intrusion detection and response; firewall defence; privacy and ethics issues; security configurations to PC-based applications; and design of information systems with security compliance and security standards and protocols.
Students will be expected to spend a total of 36 hours per week during summer semester on this unit as follows:
For on-campus students:
Off-campus students generally do not attend lecture and tutorial sessions, however, you should plan to spend equivalent time working through the relevant resources and participating in discussion groups each week.
CPE3001, CPE2007, CSE2500, GCO2831, FIT2058, FIT3018, FIT4028, GCO4831
One of FIT1005, FIT1031, FIT1019, FIT2008, CSE2318, CSE3318 or GCO1815
Dr. Abdul Malik Khan
Consultation hours: To be advised
Dr. Abdul Malik Khan
Consultation hours: To be advised
Week | Activities | Assessment |
---|---|---|
0 | None ...........................Note: Activities are in Days and not in weeks! | No formal assessment or activities are undertaken during this Day-0 |
1 | Day-1:Jan-07: Lecture LN01 on: OSI Security Architecture | |
2 | Day-2:Jan-08: Complete LN01; Start Lecture LN02 on: Symmetric Encryption | |
3 | Day-3:Jan-09: Complete LN02; Lecture Start LN03 on: Asymmetric Encryption | |
4 | Day-4:Jan-14: Lecture LN04 on: Authentication Application | |
5 | Day-5:Jan-15: Lecture LN05 on: Web Security | |
6 | Day-6:Jan-16: Lecture LN06 on: Wireless Security | Assignment 1 due Monday 20 January 2014, 4:00 PM |
7 | Day-7:Jan-21: Lecture LN07 on: Electronic Mail Security | |
8 | Day-8:Jan-22: Lecture LN08 on: IP Security | |
9 | Day-9:Jan-23: Lecture LN09 on: Intrusion Detection and Response | |
10 | Day-10:Jan-28: Lecture LN10 on: Malicious Software Attack | Class Test on Tuesday 28 January 2014. The test will be held during the first hour of the lecture on 28 January 2014. It will cover material from LN01 to LN08 (inclusive of LN08 IP Security). |
11 | Day-11:Jan-29: Lecture LN11 on: Firewall | |
12 | Day-12:Jan-30: Lecture LN12 on: Network Management | |
SWOT VAC. Exam in official summer exam period 10-12 Feb. (Scheduled with Examinations Branch) | No formal assessment is undertaken in SWOT VAC. Note: 3 hours of Final Exam To be Advised! | |
Examination period | LINK to Assessment Policy: http://policy.monash.edu.au/policy-bank/ academic/education/assessment/ assessment-in-coursework-policy.html |
*Unit Schedule details will be maintained and communicated to you via your learning system.
Examination (3 hours): 60%; In-semester assessment: 40%
Assessment Task | Value | Due Date |
---|---|---|
Assignment 1 | 20% | Monday 20 January 2014, 4:00 PM |
Class Test | 20% | Tuesday 28 January 2014, Day-10 |
Examination 1 | 60% | To be advised |
Faculty Policy - Unit Assessment Hurdles (http://intranet.monash.edu.au/infotech/resources/staff/edgov/policies/assessment-examinations/assessment-hurdles.html)
Academic Integrity - Please see the Demystifying Citing and Referencing tutorial at http://lib.monash.edu/tutorials/citing/
Further details will be provided in the assignment specification.
Further details will be provided in the unit introduction lecture for assessment task 2 which will be a class test.
Monash Library Unit Reading List
http://readinglists.lib.monash.edu/index.html
Examination/other end-of-semester assessment feedback may take the form of feedback classes, provision of sample answers or other group feedback. Please check with your lecturer on the feedback provided and take advantage of this prior to requesting individual consultations with staff. If your unit has an examination, you may request to view your examination script booklet, see http://intranet.monash.edu.au/infotech/resources/students/procedures/request-to-view-exam-scripts.html
Types of feedback you can expect to receive in this unit are:
Submission must be made by the due date otherwise penalties will be enforced.
You must negotiate any extensions formally with your campus unit leader via the in-semester special consideration process: http://www.monash.edu.au/exams/special-consideration.html
It is a University requirement (http://www.policy.monash.edu/policy-bank/academic/education/conduct/student-academic-integrity-managing-plagiarism-collusion-procedures.html) for students to submit an assignment coversheet for each assessment item. Faculty Assignment coversheets can be found at http://www.infotech.monash.edu.au/resources/student/forms/. Please check with your Lecturer on the submission method for your assignment coversheet (e.g. attach a file to the online assignment submission, hand-in a hard copy, or use an online quiz). Please note that it is your responsibility to retain copies of your assessments.
If Electronic Submission has been approved for your unit, please submit your work via the learning system for this unit, which you can access via links in the my.monash portal.
Please check with your lecturer before purchasing any Required Resources. Limited copies of prescribed texts are available for you to borrow in the library, and prescribed software is available in student labs.
Software:
The software used in this unit is available in the public domain. The software is PGP encryption software which is available at:
http://www.pgpi.org/products/pgp/versions/freeware/win32
and
http://www.gpg4win.org/download.html
Limited copies of prescribed texts are available for you to borrow in the library.
W. Stallings. (2013). Network Security Essentials: Applications and Standards. (5th Edition) Pearson International.
O. Poole. (2003). Network Security - A Practical Guide. () Butterworth Heinemann.
J. H. Allen. (2001). The CERT Guide to System and Network Security Practices. () Addison-Wesley.
M. Kaeo. (2004). Designing Network Security - A Practical Guide to Creating a Secure Network Infrastructure. () CISCO Press.
R. Oppliger. (2003). Security Technologies for the World Wide Web. () Artech House.
Monash has educational policies, procedures and guidelines, which are designed to ensure that staff and students are aware of the University’s academic standards, and to provide advice on how they might uphold them. You can find Monash’s Education Policies at: www.policy.monash.edu.au/policy-bank/academic/education/index.html
Key educational policies include:
The University provides many different kinds of support services for you. Contact your tutor if you need advice and see the range of services available at http://www.monash.edu.au/students. For Sunway see http://www.monash.edu.my/Student-services, and for South Africa see http://www.monash.ac.za/current/.
The Monash University Library provides a range of services, resources and programs that enable you to save time and be more effective in your learning and research. Go to www.lib.monash.edu.au or the library tab in my.monash portal for more information. At Sunway, visit the Library and Learning Commons at http://www.lib.monash.edu.my/. At South Africa visit http://www.lib.monash.ac.za/.
For more information on Monash’s educational strategy, see:
www.monash.edu.au/about/monash-directions and on student evaluations, see: www.policy.monash.edu/policy-bank/academic/education/quality/student-evaluation-policy.html
The main highlights last year were the addition of:
The teaching team agreed to consider a class test based on student response to exams. This has been implemented for both Semester 1 and Summer Semester B. However, with OCL student enrolment included, implementation of a class test is not feasible for Semester 2.
If you wish to view how previous students rated this unit, please go to
https://emuapps.monash.edu.au/unitevaluations/index.jsp