Note: This is an archived Handbook entry from 2014.
|Dates & Locations:|| |
This subject is not offered in 2014.
|Time Commitment:||Contact Hours: 3 hours per week |
Total Time Commitment:
|Recommended Background Knowledge:|| |
|Non Allowed Subjects:|| |
433-645 Software System Security
|Core Participation Requirements:||
For the purposes of considering request for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Student Support and Engagement Policy, academic requirements for this subject are articulated in the Subject Overview, Learning Outcomes, Assessment and Generic Skills sections of this entry.
It is University policy to take all reasonable steps to minimise the impact of disability upon academic study, and reasonable adjustments will be made to enhance a student's participation in the University's programs. Students who feel their disability may impact on meeting the requirements of this subject are encouraged to discuss this matter with a Faculty Student Adviser and Student Equity and Disability Support: http://services.unimelb.edu.au/disability
The subject will explore foundational knowledge in the area of cryptography and information security. The overall aim is to gain an understanding of fundamental cryptographic concepts like encryption and signatures and use it to build and analyze security in computers, communications and networks. This subject covers fundamental concepts in information security on the basis of methods of modern cryptography, including encryption, signatures and hash functions.
This subject is an elective subject in the Master of Engineering (Software). It can also be taken as an advanced elective in Master of Information Technology.
The subject will be made up of three parts:
A particular emphasis will be placed on real-life protocols such as Secure Socket Layer (SSL) and Kerberos.
Topics drawn from:
INTENDED LEARNING OUTCOMES (ILO)
On completion of this subject the student is expected to:
Hurdle requirement: To pass the subject, students must obtain at least:
Intended Learning Outcomes (ILOs) 1 to 4 are addressed in the examination and the two assignments. ILOs 1, 5 and 6 and generic skills are addressed in the group project work.
Assignment 1 and 2 tests the knowledge of the core modules of the subject topic introduced in lectures. They are generally extensions of tutorial questions. The knowledge earned during the semester is finally tested in 2 hour examination The group work, done in a group of two students, tests research and presentation skills.
|Prescribed Texts:|| |
|Breadth Options:|| |
This subject is not available as a breadth subject.
|Fees Information:||Subject EFTSL, Level, Discipline & Census Date|
On completion of this subject, students should have the following skills:
LEARNING AND TEACHING METHODS
Each week there will be student centred activities planned within two lectures and a workshop. In workshops, tutorial questions illustrating the main concepts taught in the lectures will be discussed.
INDICATIVE KEY LEARNING RESOURCES
Students will have access to lecture notes and lecture slides. The subject LMS site also contains links to recommended textbook and resources on security and cryptography.
CAREERS / INDUSTRY LINKS
The concepts of security, trust and privacy are very much essential in a range of disciplines in computing and software engineering. This knowledge and skills learned in the subject also forms a basis of many professional careers such as practicing engineers, consultants and Information Technology specialists. Guest lectures by experts from Industry on specific topics from network security and cryptography will be organized.
Master of Engineering in Distributed Computing |
Master of Information Technology
Master of Information Technology
Master of Philosophy - Engineering
Master of Science (Computer Science)
Master of Software Systems Engineering
B-ENG Software Engineering stream |
Master of Engineering (Software with Business)
Master of Engineering (Software)
Download PDF version.