Skip to menu Skip to content Skip to footer
Course profile

Information Security Essentials (CYBR7002)

Study period
Sem 2 2024
Location
St Lucia
Attendance mode
In Person

Course overview

Study period
Semester 2, 2024 (22/07/2024 - 18/11/2024)
Study level
Postgraduate Coursework
Location
St Lucia
Attendance mode
In Person
Units
2
Administrative campus
St Lucia
Coordinating unit
Elec Engineering & Comp Science School

This is an introductory course covering key concepts and best practices in information security, and their application to the protection of organisation assets and business needs. It is designed for students from a broad range of backgrounds. It will include, but not be limited to topics such as; governance of information assets and ICT assets, develop understanding of business impact analysis of the confidentiality, integrity and availability of information assets and ICT assets, risk management using preventative, detective and responsive controls to manage risk, access control of information and information processing facilities, authentication protocols such as; shared secrets, cryptographic hash functions and challenge-response protocols. Topic coverage may also include; using biometrics for authentication, introduction to applied cryptography in information security, network and wireless network security, physical security of information assets, HR security, securing the human, phishing and social engineering, payment card industry security, cloud computing security, industrial control systems and cooperative and automated vehicles.

Topics that will be covered include risk management, access control, authentication, authorisation, symmetric and asymmetric cryptography, network security and application-layer security, for example payment cards andᅠindustrial control systems (ICS)ᅠsecurity. Current industry standards will be referenced, including the ISO/IEC 27000 series on Information Security,ᅠthe Payment Card Industry Data Security Standard (PCI DSS), and the NIST Special Publications 800-53 & 800-82. Students will gain a basic knowledge of current real world Information Security practices and procedures.

Course Changes in Response to Previous Student Feedback:

In response to valuable feedback from previous students, several enhancements and adjustments have been made to the assessment: simplify the attack-defence role play as one assessment with immediate feedback and with fixed presentation date for fairness.

Course requirements

Incompatible

You can't enrol in this course if you've already completed the following:

COMS3000 or CYBR3000 or COMS7003

Course contact

Course staff

Lecturer

Dr Naipeng Dong

Timetable

The timetable for this course is available on the UQ Public Timetable.

Aims and outcomes

The aim of the course is to provide an introduction to essential knowledge and skills in the field of Information Security. Concepts such as Access Control, Authentication, Integrity and Confidentiality will be discussed and students will gain an understanding of the basic cryptographic primitives and protocols that are required to implement these security goals. Students will develop the skills to perform practical Threat, Vulnerability and Risk Analysis, understand Information Security standards and be able to assess Information Security risks based on third-party attestations of standards compliance in on-premise, remote, cloud or edge-computing environments.

Learning outcomes

After successfully completing this course you should be able to:

LO1.

describe and apply the concepts of Information Security, such as Confidentiality, Integrity, Authentication and Non-Repudiation, and their relevance in various contexts.

LO2.

analyse and critically evaluate a range of access control and authentication mechanisms, including passwords, biometrics, PKI and multifactor authentication for various Australian and international application scenarios.

LO3.

critically evaluate and apply cryptographic techniques, mechanisms and protocols.

LO4.

independently locate, interpret and critically judge academic and other literature in the field of Information Security, and then apply outcomes to plan, evaluate, develop and reflect critically on justifications in academic reports.

LO5.

compute the information theoretic entropy of random variables, passwords, etc.

LO6.

analyse and critically report on the security of information systems.

LO7.

understand the development of international information security standards by multi-cultural interdisciplinary teams and the importance and application of these international standards to support both domestic and international cross-jurisdictional information security requirements throughout the world.

LO8.

development of group skills in attack-defence activities.

Assessment

Assessment summary

Category Assessment task Weight Due date
Quiz In-class Quiz Series
10%

Week 3 - Week 7

Week 11 - Week 13

The quiz is 2:05 - 2:10 PM during class

Presentation Presentation
  • Team or group-based
  • In-person
20%

17/09/2024

Whole day

Paper/ Report/ Annotation Report
  • Online
30%

15/10/2024 2:00 pm

Examination Final exam
  • Hurdle
  • Identity Verified
  • In-person
40%

End of Semester Exam Period

2/11/2024 - 16/11/2024

A hurdle is an assessment requirement that must be satisfied in order to receive a specific grade for the course. Check the assessment details for more information about hurdle requirements.

Assessment details

In-class Quiz Series

Mode
Written
Category
Quiz
Weight
10%
Due date

Week 3 - Week 7

Week 11 - Week 13

The quiz is 2:05 - 2:10 PM during class

Other conditions
Time limited.

See the conditions definitions

Learning outcomes
L01, L02, L03, L05, L07

Task description

For each Quiz, students are given 5 minutes to answer 1-2 questions provided in the lectures, based on learned course material, and submit their answers. The quizzes are during lecture time. Students can bring your own devices to class or submit a paper copy.

These are multiple choices and short answers, some with calculations, as individual work, to test the students' ability to apply the knowledge they have gained from the course material in new scenarios.

There are 8 quizzes in total. Top 5 will be counted. Each Quiz counts 2%. In total 10%.

This assessment task is to be completed in-person. The use of generative Artificial Intelligence (AI) and Machine Translation (MT) tools will not be permitted. Any attempted use of Generative AI may constitute student misconduct under the Student Code of Conduct.

Submission guidelines

Directly input answers in Blackboard test or submit a paper copy (Details see Learn.UQ at https://learn.uq.edu.au/).


Deferral or extension

You cannot defer or apply for an extension for this assessment.

No extensions available and 100% late penalty applied for the quizzes. To accommodate unforeseen circumstances such as illness, your quiz score will be based on the best 5 out of 8 submissions.

Presentation

  • Team or group-based
  • In-person
Mode
Oral
Category
Presentation
Weight
20%
Due date

17/09/2024

Whole day

Task description

Students are required to research and critically evaluate security risks and their counter measures and present in a group a summary and discussion of the selected attacking or defending scenario in the form of a presentation. This assessment tests students ability to compile a paper in group that demonstrates the ability to locate high quality sources of relevant information, to understand complex concepts, to critically analyse and integrate information from a wide range of sources, to evaluate opinions, make decisions and to reflect critically on the justifications for decisions; and the ability synthesize a clear and concise paper of the appropriate level and style.

Presentation is a fixed date in Week 9 (Tuesday.) The assessment will be recorded. See Blackboard site for detailed schedule.

This assessment task is to be completed in-person. The use of generative Artificial Intelligence (AI) and Machine Translation (MT) tools will not be permitted. Any attempted use of Generative AI may constitute student misconduct under the Student Code of Conduct.

Submission guidelines

Reports and slides are submitted online (see blackboard for details)

Deferral or extension

You cannot defer or apply for an extension for this assessment.

Oral sessions or Demo sessions scheduled with multiple markers and is time limited. Extension impacts on other students in team.

Late submission

You will receive a mark of 0 if this assessment is submitted late.

Report

  • Online
Mode
Written
Category
Paper/ Report/ Annotation
Weight
30%
Due date

15/10/2024 2:00 pm

Learning outcomes
L01, L02, L03, L04, L05, L06, L07

Task description

In this assignment, students are required to compile a report that demonstrates their ability to formulate and investigate problems, to critically analyse and integrate information from a wide range of sources, recognising the roles and expertise of associated disciplines, to evaluate opinions, make decisions and to reflect critically on the justifications for decisions, to generate ideas and adapt innovatively to create solutions, with an appreciation of the link between theory and practice, to innovate and improve current practices; and the ability synthesize a clear and concise research report of the appropriate level and style.

This assessment task evaluates students' abilities, skills and knowledge without the aid of generative Artificial Intelligence (AI) or Machine Translation (MT). Students are advised that the use of AI technologies to develop responses is strictly prohibited and may constitute student misconduct under the Student Code of Conduct.

Submission guidelines

An electronic copy of your assignment is required to be submitted via Blackboard (Learn.UQ at https://learn.uq.edu.au/).
Submit early - updates can be submitted up until the deadline - it is your responsibility to ensure your assignment is successfully submitted BEFORE the deadline.
No hard copy is required for this assignment.

Deferral or extension

You may be able to apply for an extension.

The maximum extension allowed is 21 days. Extensions are given in multiples of 24 hours.

Feedback will be given to students in a timeframe of 21-28 days, where the earlier time frame applies if there are no extensions.

Late submission

A penalty of 10% of the maximum possible mark will be deducted per 24 hours from time submission is due for up to 7 days. After 7 days, you will receive a mark of 0.

Final exam

  • Hurdle
  • Identity Verified
  • In-person
Mode
Written
Category
Examination
Weight
40%
Due date

End of Semester Exam Period

2/11/2024 - 16/11/2024

Learning outcomes
L01, L02, L03, L04, L05, L06, L07

Task description

The exam will be an on-campus paper-based exam. This exam will be a closed book and will contain a combination of multiple choices and short answers, some with calculations. It is individual work; to test the students' ability to apply the knowledge they have gained from the course material in new scenarios.

This assessment task evaluates students' abilities, skills and knowledge without the aid of generative Artificial Intelligence (AI) or Machine Translation (MT). Students are advised that the use of AI technologies to develop responses is strictly prohibited and may constitute student misconduct under the Student Code of Conduct.

Hurdle requirements

You must achieve at least 40% in the task to pass the course.

Exam details

Planning time 10 minutes
Duration 90 minutes
Calculator options

Any calculator permitted

Open/closed book Open Book examination
Exam platform Paper based
Invigilation

Invigilated in person

Submission guidelines

Deferral or extension

You may be able to defer this exam.

Late submission

You will receive a mark of 0 if this assessment is submitted late.

Deferred exam is made available given unexpected circumstances.

Course grading

Full criteria for each grade is available in the Assessment Procedure.

Grade Cut off Percent Description
1 (Low Fail) 0 - 19

Absence of evidence of achievement of course learning outcomes.

Course grade description: Fails to demonstrate most or all of the basic requirements of the course.

2 (Fail) 20 - 44

Minimal evidence of achievement of course learning outcomes.

Course grade description: Demonstrates clear deficiencies in understanding and applying fundamental concepts; communicates information or ideas in ways that are frequently incomplete or confusing and give little attention to the conventions of the discipline.

3 (Marginal Fail) 45 - 49

Demonstrated evidence of developing achievement of course learning outcomes

Course grade description: Demonstrates superficial or partial or faulty understanding of the fundamental concepts of the field of study and limited ability to apply these concepts; presents undeveloped or inappropriate or unsupported arguments; communicates information or ideas with lack of clarity and inconsistent adherence to the conventions of the discipline.

4 (Pass) 50 - 64

Demonstrated evidence of functional achievement of course learning outcomes.

Course grade description: Demonstrates adequate understanding and application of the fundamental concepts of the field of study; develops routine arguments or decisions and provides acceptable justification; communicates information and ideas adequately in terms of the conventions of the discipline.

5 (Credit) 65 - 74

Demonstrated evidence of proficient achievement of course learning outcomes.

Course grade description: Demonstrates substantial understanding of fundamental concepts of the field of study and ability to apply these concepts in a variety of contexts; develops or adapts convincing arguments and provides coherent justification; communicates information and ideas clearly and fluently in terms of the conventions of the discipline.

6 (Distinction) 75 - 84

Demonstrated evidence of advanced achievement of course learning outcomes.

Course grade description: As for 5, with frequent evidence of originality in defining and analysing issues or problems and in creating solutions; uses a level, style and means of communication appropriate to the discipline and the audience.

7 (High Distinction) 85 - 100

Demonstrated evidence of exceptional achievement of course learning outcomes.

Course grade description: As for 6, with consistent evidence of substantial originality and insight in identifying, generating and communicating competing arguments, perspectives or problem solving approaches; critically evaluates problems, their solutions and implications.

Additional course grading information

If the final total percentage for all assessment, calculated at the end of the semester, results in a fractional component, then any fractional component is rounded up to the next whole integer before calculating the final grade. This only applies to the final result and not to individual pieces of assessment, where any fractional results are included, as is, in the calculation of the final percentage.

Supplementary assessment

Supplementary assessment is available for this course.

Learning resources

You'll need the following resources to successfully complete the course. We've indicated below if you need a personal copy of the reading materials or your own item.

Library resources

Find the required and recommended resources for this course on the UQ Library website.

Other course materials

Recommended

Item Description Further Requirement
Mark Stamp. Information Security: Principles and Practice, Wiley
Michael Brewer, Information security, DISC/British Standards Institution
Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley
William Stallings, Cryptograhy and Network Security: principles and practice, Prentice Hall
C. Kaufman et al., Network Security: Private Communication in a Public World, Prentice Hall
Bruce Schneier, Secret and Lies, Wiley
Ross Anderson, Security Engineering, Wiley
Albert Menezes et al., The Handbook of applied Cryptography
Matt Bishop, Computer Security, Prentice Hall

Additional learning resources information

All relevant learning material such as additional reading, lecture slides, tutorials etc. will be available via Blackboard.

Learning activities

The learning activities for this course are outlined below. Learn more about the learning outcomes that apply to this course.

Filter activity type by

Please select
Clear filters
Learning period Activity type Topic
Multiple weeks

From Week 1 To Revision week

General contact hours

Consultation

Every Thursday morning 10:00-12:00

Learning outcomes: L01, L02, L03, L04, L05, L06, L07, L08

Week 1
Lecture

Introduction to the course; Admin issues

Learning outcomes: L01, L02, L03, L04, L05, L06, L07, L08

Tutorial

Introduction to analysis scenarios

Learning outcomes: L06

Week 2
Lecture

Introduction to Information Security; Risk Management; Access Control

Learning outcomes: L01, L02

Tutorial

Q&A on Information Security; Risk Management; Access Control

Learning outcomes: L01, L02

Week 3
Lecture

Password; Cryptographic Hashes; Salt

Learning outcomes: L01, L02, L03

Tutorial

Q&A on Information Security; Risk Management; Access Control

Learning outcomes: L01, L02, L03

Week 4
Lecture

Historical Crypto; Introduction to modern Cryptography

Learning outcomes: L01, L03

Team Based Learning

Work in team to discuss the risk identification

Week 5
Lecture

Symmetric Encryption; Asymmetric Encryption

Learning outcomes: L03

Tutorial

Q& A on Historical Crypto; Intro to modern Cryptography

Learning outcomes: L03

Week 6
Lecture

Digital Signature; Public Key Infrastructure; Quantum Computing & Post-quantum Cryptography

Learning outcomes: L03

Tutorial

Q& A on Symmetric/Asymmetric Encryption; Digital Signature; Public Key Infrastructure

Learning outcomes: L03

Week 7
Lecture

Authentication Protocols; Transport Layer Security

Learning outcomes: L03

Tutorial

Q&A on Authentication Protocols; Transport Layer Security;

Learning outcomes: L03

Week 8
Lecture

Network Security

Learning outcomes: L07

Team Based Learning

Work in team to discuss the presentation

Week 9
Seminar

Presentation

Learning outcomes: L01, L02, L03, L04, L05, L06, L07

Seminar

Presentation

Learning outcomes: L01, L02, L03, L04, L05, L06, L07

Week 10
Lecture

Biometrics; Authorisation

Learning outcomes: L02

Tutorial

Feedback session to students

Learning outcomes: L01, L02, L03, L04, L05, L06, L07, L08

Week 11
Lecture

Trust; Zero-Trust; Blockchain

Learning outcomes: L02, L07

Tutorial

Final Report Q&A session

Learning outcomes: L01, L02, L03, L04, L05, L06, L07

Week 12
Lecture

Guest lecture

Learning outcomes: L02, L07

Tutorial

Q&A on Biometrics; Authorisation; Trust; Blockchain

Week 13
Lecture

Information Theory

Learning outcomes: L05

Tutorial

Exam Q&A

Learning outcomes: L01, L02, L03, L04, L05, L06, L07

Policies and procedures

University policies and procedures apply to all aspects of student life. As a UQ student, you must comply with University-wide and program-specific requirements, including the:

Learn more about UQ policies on my.UQ and the Policy and Procedure Library.

School guidelines

Your school has additional guidelines you'll need to follow for this course: