Note: This is an archived Handbook entry from 2016.
|Dates & Locations:|| |
This subject has the following teaching availabilities in 2016:Semester 2, Parkville - Taught on campus.
Timetable can be viewed here. For information about these dates, click here.
|Time Commitment:||Contact Hours: 36 hours, comprising of one 2 hour lecture and one 1 hour workshop per week. |
Total Time Commitment:
Study Period Commencement:
|Recommended Background Knowledge:|| |
|Non Allowed Subjects:|| |
|Core Participation Requirements:||
CoordinatorDr Atif Ahmad
Information is a valuable asset that requires protection from increasingly sophisticated and complex security threats. Given the ease with which information can be collected directly from individuals or secretly through technologies presents new challenges for protecting privacy.
An effective security strategy requires a sophisticated understanding of risk management and how a range of tools and techniques can be applied for protective purposes.
In this subject students will be exposed to a range of issues related to information privacy and security. These issues drive the need for better security tools, technologies and techniques. Students will learn foundational concepts that explain how security strategy is developed. Topics include: the security threat landscape, managing security risk exposure, protective paradigms, models and frameworks, and cryptographic techniques to secure information.
For Bachelor of Science students this is a required subject in the Informatics major and an elective subject in the Science Informatics major and the concurrent Diploma in Informatics. This subject is available as a breadth subject for other Bachelor degrees and is an elective in the Working with Information breadth track.
Intended Learning Outcomes (ILOs)
On completion of this subject the student is expected to:
To pass the subject, students must obtain
|Prescribed Texts:|| |
|Breadth Options:|| |
This subject potentially can be taken as a breadth subject component for the following courses:
You should visit learn more about breadth subjects and read the breadth requirements for your degree, and should discuss your choice with your student adviser, before deciding on your subjects.
|Fees Information:||Subject EFTSL, Level, Discipline & Census Date|
On completion of this subject, students should have developed the following generic skills:
Learning and Teaching Methods
The subject will be delivered through a combination of lectures, tutorials, group presentations and team-based learning where a group of students will analyse the information manage needs or an organization and design an information management system. Outside class students will study theory and cases through reading and continuing their group activities.
Indicative Key Learning Resources
Students will have access to lecture notes and lecture slides. The subject LMS site also contains links to recommended literature and other resources.
All organizations must manage their information in order to be effective. There is a large range of career opportunities for information managers, analysts and consultants both within and outside the IT industry. There will be one or two lectures from invited practitioners from industry.
Science-credited subjects - new generation B-SCI and B-ENG.
Selective subjects for B-BMED
Download PDF version.