University of Technology Sydney

32548 Cybersecurity

Warning: The information on this page is indicative. The subject outline for a particular session, location and mode of offering is the authoritative source of all information about the subject for that offering. Required texts, recommended texts and references in particular are likely to change. Students will be provided with a subject outline once they enrol in the subject.

Subject handbook information prior to 2020 is available in the Archives.

UTS: Information Technology: Electrical and Data Engineering
Credit points: 6 cp

Subject level:

Postgraduate

Result type: Grade and marks

Requisite(s): 32524 LANS and Routing OR 49202 Communication Protocols

Recommended studies:

a sound knowledge of computer systems and networking protocols

Description

This subject consolidates the student's understanding of cyber security by considering security principles, methodologies and technologies from a technical and management perspective used in practice. The subject allows students to learn about and discuss various cyber attack techniques used in practice, and methods to defend against such attacks using industry standard tools and techniques. Topics include cyber attacks and defenses, web security, firewalls, intrusion detection systems along with security services such as confidentiality, integrity, authentication (CIA) and technologies such as IPSec, SSL, PGP and S/MIME.

Subject learning objectives (SLOs)

Upon successful completion of this subject students should be able to:

1. Explain the major theories and principles that are used in the implementation of a secure network.
2. Explain the underlying algorithms used to construct Security Protocols
3. Identify and explain the major threats and their mitigation associated with cyber security.
4. Explain the major methodologies for secure networks and what threat they address.
5. Compare and contrast the technologies used in achieving security at various layers following OSI/TCP/IP layered structure.
6. Implement and reflect on solutions for cyber security.

Course intended learning outcomes (CILOs)

This subject also contributes specifically to the development of the following Course Intended Learning Outcomes (CILOs):

  • Socially Responsible: FEIT graduates identify, engage, and influence stakeholders, and apply expert judgment establishing and managing constraints, conflicts and uncertainties within a hazards and risk framework to define system requirements and interactivity. (B.1)
  • Design Oriented: FEIT graduates apply problem solving, design thinking and decision-making methodologies in new contexts or to novel problems, to explore, test, analyse and synthesise complex ideas, theories or concepts. (C.1)
  • Technically Proficient: FEIT graduates apply theoretical, conceptual, software and physical tools and advanced discipline knowledge to research, evaluate and predict future performance of systems characterised by complexity. (D.1)

Teaching and learning strategies

This subject will be delivered as a series of interactive lectures and lab sessions. The subject relies heavily on UTS Canvas, therefore students are expected to check UTS Canvas regularly to access materials and weekly activities.

Lectures are supported by PowerPoint slides, learning materials and strategies described in the Learning Guide. Students are required to read the lecture materials and answer online questions before the lecture. During the lecture, these online questions will be discussed, linking them to the lecture contents, and helping to focus the lecture time on topics that students have found most challenging. The lecture format will be interactive, and from time to time, students will be invited to discuss or present their ideas during the class. Not all of the weekly reading material will be covered during the lecture time. Hence, it is the student's responsibility to read all materials, including those that are not specifically covered during the lecture time. All materials given in the subject readings are examinable, even those not directly presented or discussed in lectures. Students will gain most from the class time by reading each week's preparation material in advance and clarifying any questions during the interactive lecture sessions, student consultation times and lab discussion times.

During each week's lab session, students will perform a set of provided tasks. The tasks are closely related to the week's lecture topic. There will be discussion sessions during the lab where the lab instructor will pose questions related to the lab activities and students will work in groups to answer the questions by performing hands-on activities, engaging in group discussions, as well as looking through Internet resources.

Students are expected to attend and participate in all lab activities, contribute to online discussions, complete assignments by their due dates and actively participate in groups for the group-based activities both in and out of class time. An average student aiming to pass the subject is expected to invest 9-10 learning hours each session week for this subject.

The subject will be delivered as a 1.5 hour interactive lecture, followed by a 1.5 hour laboratory session.

Content (topics)

This subject covers the fundamental issues involving cyber security, and latest developments on security protocols, technologies, standards and applications.

The topics are categorised into: (1) Cyber security strategy, (2) Network level security, and (3) Application level security.

1. Cyber security strategy

  • Strategy and Governance
  • Cyber Threat Intelligence
  • Secure coding principles

2. Network level security

  • TCP/IP security
  • Web security
  • Operating Systems security
  • Access control, Wireless and Mobile security

3. Application level security

  • DoS and DDOS attack
  • Mail security
  • Intrusion Detection/Prevention Systems
  • Firewalls, IPSec and IoT security

Assessment

Assessment task 1: Quiz

Intent:

The quizzes are designed to motivate continuous learning, analysis and recall the technical knowledge relevant to the subject concepts.

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

1, 2, 4 and 5

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

B.1, C.1 and D.1

Type: Quiz/test
Groupwork: Individual
Weight: 20%
Length:

20 to 30 minutes in duration

Assessment task 2: Skills Based Assessment

Intent:

The skills based assessment is for students to demonstrate practical skills in identifying and resolving network security issues as might be found in practice.

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

2, 3, 4, 5 and 6

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

B.1, C.1 and D.1

Type: Laboratory/practical
Groupwork: Individual
Weight: 30%

Assessment task 3: Final Exam

Intent:

The exam will explore the extent of student knowledge and understanding throughout the subject.

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

1, 2, 3 and 5

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

B.1, C.1 and D.1

Type: Examination
Groupwork: Individual
Weight: 20%
Length:

2 hours

Assessment task 4: Research Project

Intent:

This task is for students to demonstrate an understanding of a given security problem, and to design and implement a solution for the problem.

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

1, 2, 4, 5 and 6

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

C.1 and D.1

Type: Project
Groupwork: Group, group assessed
Weight: 10%
Length:

The maximum length of the report excluding appendix and references should not be more than 20 pages.

Assessment task 5: Lab Submission

Intent:

For students to demonstrate hands-on learning of cybersecurity concepts

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

2, 3, 4 and 5

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

C.1 and D.1

Type: Laboratory/practical
Groupwork: Individual
Weight: 20%

Minimum requirements

In order to pass the subject, a student must achieve an overall mark of 50% or more.

Required texts

  1. Chwan-Hwa (john) Wu & J. David Irwin, "Introduction to Computer Networks and Cyber Security", CRC Press, ISBN: 978-1-4665-7213-3.
  2. William Stallings,"Network Security Essentials Applications and Standards" (5th Edition/ 6th Edition) ISBN-10: 0133370437, ISBN-13: 978-0133370430.
  3. Wenliang Du, "Computer security: A Hands-on Approach", ISBN-13:978-1548367947.

Recommended texts

  1. Eric Cole, "Network Security Bible" (2nd Edition) ISBN-10: 0470502495 | ISBN-13: 978-0470502495. Available as an ebook.
  2. Behrouz A. Forouzan, "Cryptography and Network Security", ISBN: 978-0-07-287022-0, McGrawHill.
  3. Michael T. Goodrich & Roberto Tamassia, "Introduction to Computer Security", ISBN-10: 0-321-31294-4, Pearson.
  4. William Stallings & Lawrie Brown, "Computer Security", 4th edition, ISBN-10: 1-292-22061-9, Pearson, Global Edition
  5. James Helfrich, "Security for Software Engineers", CRC Press, 2019, ISBN: 13:978-1-138-58382-5

References

All additional reference materials will be posted on UTS Canvas.

Other resources

UTS Canvas - canvas.uts.edu.au

Canvas will be used as the major means of communication between subject co-ordinator, teaching staffs and students. Any change in schedule will be updated in Canvas. It is the responsibility of the student to read Canvas regularly. Canvas will be used to provide the lecture notes and the tutorials.