Entry Requirements and Weighting

Prerequisites: N/A
Corequisites: N/A
Credit Points: 15 Credit Points
Level: Year 2, Core
Workload: Timetabled hours/week: 4 (Lecture = 2 hours, Tute/Lab = 2 hours)
  Personal study hours per week: 5

Brief Description

This is a third trimester core unit out of a total of 24 units in the Bachelor of Networking (BNet) and Bachelor of Engineering Technology (Telecommunications) BEngTech(Tel). This unit addresses the BNet and BEngTech(Tel) course learning outcomes and complements other courses in a related field by developing students’ knowledge and skills in networks. For further course information refer to: http://www.mit.edu.au/study-with-us/programs/bachelor-networking and http://www.mit.edu.au/study-with-us/programs/bachelor-engineering-technology-telecommunications

This unit provides students with a comprehensive overview of the field of network security, security risks and countermeasures associated with network connectivity. Students will gain knowledge and skills to understand, apply and manage network security. There are some activities designed to protect network data that include protecting the usability, reliability, integrity, and safety of network and data.

The unit will help students to identify common security vulnerabilities, threats and in depth analysis of these threats that network users often face. It will help students to respond to and recover from security incidents through case studies/workshops.

The content of this unit will cover the following areas:

  • Introduction of Network Security
  • Symmetric Encryption and Message Confidentiality
  • Public‐Key Cryptography and Message Authentication
  • Key Distribution and User Authentication
  • Transport‐Level Security
  • Electronic Mail Security
  • IP Security
  • Intruders
  • Malicious Software
  • Firewalls
  • Case studies

Learning Outcomes

At the completion of this unit students should be able to:

  1. Discuss common threats and attacks on networked information systems
  2. Explain the major methodologies for secure networks and what threat they address
  3. Identify network threats, administrate secure backup and recovery procedures
  4. Implement security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization
  5. Demonstrate clear understanding of threats and risks and argue the pros and cons of common countermeasures
  6. Identify most common intrusion detection attacks, and discuss how to prevent them
  7. Understand ethical obligations of being security professional
  8. Apply skills to analyse complex problems in network security under supervision

Graduate Attributes

MIT is committed to ensure the course is current, practical and relevant so that graduates are “work ready” and equipped for life-long learning. In order to accomplish this, the MIT Graduate Attributes identify the required knowledge, skills and attributes that prepare students for the industry.
The level to which Graduate Attributes covered in this unit are as follows:

Ability to communicate Independent and Lifelong Learning Ethics Analytical and Problem Solving Cultural and Global Awareness Team work Specialist knowledge of a field of study
             

Legend

Colour coding    

Extent covered

                                The standard  is covered by theory and practice, and addressed by assessed activities in which the students always play an active role, e.g. workshops, lab submissions, assignments, demonstrations, tests, examinations
  The standard is covered by theory or practice, and addressed by assessed activities in which the students mostly play an active role, e.g. discussions, reading, intepreting documents, tests, examinations
  The standard is discussed in theory or practice; it is addressed by assessed activities in which the students may play an active role, e.g. lectures and discussions, reading, interpretation, workshops, presentations 
  The standard is presented as a side issue in theory or practice; it is not specifically assessed, but it is addressed by  activities such as lectures or tutorials
  The standard  is not considered, there is no theory or practice or activities associated with this standard