Leader: S Foster
Caulfield Second semester 2005 (Day)
Synopsis: Review of information security components, principles, problems. Types of threats, including hackers, viruses, natural disasters, fraud. Information security philosophies, methods, models, techniques and controls, including risk analysis, access matrices, passwords, smart cards, and auditing. Information security for different applications. Internet security. Ethical and legal issues. Computer crime. Information security management and policy. Internet security management and policy. Information security in the future.
Assessment: Examination: 60% + Practical work: 40%
Contact Hours: 2 hours per week
Prohibitions: IMS5002, SYS3194, SYS4110, SYS3110