Faculty of Information Technology

Monash University

Postgraduate - Unit

This unit entry is for students who completed this unit in 2015 only. For students planning to study the unit, please refer to the unit indexes in the the current edition of the Handbook. If you have any queries contact the managing faculty for your course or area of study.

print version

6 points, SCA Band 2, 0.125 EFTSL

Refer to the specific census and withdrawal dates for the semester(s) in which this unit is offered.

FacultyFaculty of Information Technology
OfferedCaulfield First semester 2015 (Evening)
Caulfield Second semester 2015 (Day)


The unit aims to provide the students with in depth knowledge of techniques required to deal with security problems in information systems. The main areas of study include symmetric and asymmetric encryption techniques, cryptographic hash functions with related topics of message authentication codes and digital signatures. Study of techniques and algorithms for providing mutual trust include key management and distribution and user authentication to establish trust in the identity of communicating partner are also included. It looks at various management issues, including use and abuse of encryption, distributed systems authentication and integrity management. A range of security applications are used as examples. Students will learn how to apply cryptographic techniques in practice.


At the completion of this unit students should be able to:

  • critically assess threats, vulnerabilities and risks to an organisation's information assets, and propose control technologies and techniques which can be applied to reduce the security risk;
  • apply a variety of cryptographic algorithms to develop methods to disguise information to ensure its integrity, confidentiality and authenticity;
  • apply a variety of methods for key management and distribution and analyse the risks associated with the various approaches;
  • implement user authentication and access control mechanisms to create a security architecture to protect the assets of the information system;
  • implement cryptographic techniques to preserve the security of information and evaluate its effectiveness;
  • apply a variety of security control technologies to IT systems in an organisation.


Examination (3 hours): 60%; In-semester assessment: 40%

Workload requirements

Minimum total expected workload equals 12 hours per week comprising:

(a.) Contact hours for on-campus students:

  • Two hours of lectures
  • One 2-hour tutorial

(b.) Additional requirements (all students):

  • A minimum of 8 hours independent study per week for completing tutorial and project work, private study and revision.

See also Unit timetable information

Chief examiner(s)


((FIT9134 or FIT5134 or FIT9018) and (FIT9135 or FIT5135 or FIT9020)) or equivalent
Introductory knowledge of computing at the undergraduate level is assumed.



Additional information on this unit is available from the faculty at: