units

FIT5163

Faculty of Information Technology

print version

This unit entry is for students who completed this unit in 2016 only. For students planning to study the unit, please refer to the unit indexes in the the current edition of the Handbook. If you have any queries contact the managing faculty for your course or area of study.

Monash University

6 points, SCA Band 2, 0.125 EFTSL

Postgraduate - Unit

Refer to the specific census and withdrawal dates for the semester(s) in which this unit is offered.

Faculty

Information Technology

Offered

Caulfield

  • First semester 2016 (Evening)
  • Second semester 2016 (Day)

Synopsis

The unit aims to provide the students with in depth knowledge of techniques required to deal with security problems in information systems. The main areas of study include symmetric and asymmetric encryption techniques, cryptographic hash functions with related topics of message authentication codes and digital signatures. Study of techniques and algorithms for providing mutual trust include key management and distribution and user authentication to establish trust in the identity of communicating partner are also included. It looks at various management issues, including use and abuse of encryption, distributed systems authentication and integrity management. A range of security applications are used as examples. Students will learn how to apply cryptographic techniques in practice.

Outcomes

At the completion of this unit, students should be able to:

  1. critically assess threats, vulnerabilities and risks to an organisation's information assets, and propose control technologies and techniques which can be applied to reduce the security risk;
  2. apply a variety of cryptographic algorithms to develop methods to disguise information to ensure its integrity, confidentiality and authenticity;
  3. ; apply a variety of methods for key management and distribution and analyse the risks associated with the various approaches;
  4. implement user authentication and access control mechanisms to create a security architecture to protect the assets of the information system;
  5. implement cryptographic techniques to preserve the security of information and evaluate its effectiveness;
  6. apply a variety of security control technologies to IT systems in an organisation.

Assessment

Examination (3 hours): 60%; In-semester assessment: 40%

Workload requirements

Minimum total expected workload equals 12 hours per week comprising:

(a.) Contact hours for on-campus students:

  • Two hours of lectures
  • One 2-hour tutorial

(b.) Additional requirements (all students):

  • A minimum of 8 hours independent study per week for completing tutorial and project work, private study and revision.

See also Unit timetable information

Chief examiner(s)

Prerequisites

((FIT9134 or FIT5134 or FIT9018) and (FIT9135 or FIT5135 or FIT9020)) or equivalent
Introductory knowledge of computing at the undergraduate level is assumed.

Prohibitions

FIT4016

Additional information on this unit is available from the faculty at: