Unit rationale, description and aim
Information security is crucial to all global organisations to protect their data, privacy, hardware, software and stakeholders from intentional or unintentional threats while conducting their business. Information Systems Security combines systems, operations and internal controls to ensure integrity, confidentiality and availability of data and operation procedures in an organisation. This unit is designed to provide students with a broad understanding of information systems security with respect to operating system, database operations, network operations, software operations and business process policies. This unit introduces concepts, theories, methodologies and techniques related to implementation of information systems security.
The aim of this unit is to ensure students have a solid understanding and knowledge of the key issues pertaining to information systems security and are able to practically implement appropriate security countermeasures to mitigate information systems security threats protecting relevant stakeholders in the interest of common good.
Campus offering
No unit offerings are currently available for this unitLearning outcomes
To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.
Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.
Explore the graduate capabilities.
Investigate potential security threats to informat...
Learning Outcome 01
Design and critically analyse security solutions t...
Learning Outcome 02
Evaluate the encryption mechanisms and its applica...
Learning Outcome 03
Integrate relevant security measures to ensure an ...
Learning Outcome 04
Evaluate and propose appropriate security counterm...
Learning Outcome 05
Content
Topics will include:
- introduction: security goals, types of threats, security policies models, security standards
- system security: access control, authentication and authorisation, file protection
- basic cryptography
- operating system security and program security
- database security
- network security
- physical security, operational security
- security planning and security policies
- legal, privacy, and ethical issues
- contemporary trends in information systems security
Assessment strategy and rationale
A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with University assessment requirements.
The first assessment provides opportunities for students to work collaboratively on the concepts of IS Security in a contextual sense. The rationale behind this assessment item is to provide students with practice in good study habits and to reinforce group learning and understanding of workshop materials. The second assessment is an opportunity to apply IS Security concepts to create an IS policy for an organisation. The aim of this assessment item is to test students’ ability to apply and synthesise the knowledge and skills in deeper levels. The last assessment provides an opportunity to reflect on the theory and practice of IS Security.
Assessment one and two are the same regardless of whether teaching mode is attendance, multi-mode, or online. Assessment three is the same for attendance and multi-modes, but changes for online mode. This is indicated in overview of assessment table below. Both methods assess the same learning outcomes.
Overview of assessments
Assessment Task 1: Reflective report on a Case St...
Assessment Task 1: Reflective report on a Case Study
Participate in online discussion forum to understand complex concepts through reflection and collaboration. The students are expected to write a report reflecting their critical analysis on potential security threats and their consequences for an information system.
The purpose of this assessment is to assess the students’ critical and analytical ability and collaborative working skills to delve into complex concepts about information systems security through reflection and collaboration.
Submission Type: Individual
Assessment Method: Reflective report
Artefact: Written report
15%
Assessment Task 2: Practical Project – Informatio...
Assessment Task 2: Practical Project – Information systems Security analysis and planning
Develop professional skills through the application of theoretical knowledge and understanding of information system security analysis and security planning for a small organisation. The students are expected to analyse case study, locate diverse resources, use relevant tools to investigate security issues and compliance, write an analysis report and propose appropriate Information systems security solutions.
The purpose of this assessment is to assess the students’ ability to use relevant resources and tools to apply their theoretical knowledge about Information systems security for analysing and planning Information system security solutions for a small organisation.
Submission Type: Individual
Assessment Method: IS Project Report
Artefact: Written report
35%
Assessment Task 3 – Attendance and Multi Modes: F...
Assessment Task 3 – Attendance and Multi Modes: Final Examination
The final exam will be designed to assess all stated learning outcomes. This is a 2-hour invigilated examination covering all unit contents. The examination includes short answer questions and case study questions.
The purpose of this assessment is to test the students’ grasp of the theoretical and soft skills (critical thinking, evaluation skills and understanding of relevant tools) aspects of the unit.
Submission Type: Individual
Assessment Method: Exam
Artefact: Written exam responses
50%
Assessment Task 3 – Online Mode: Case Study Stude...
Assessment Task 3 – Online Mode: Case Study
Students will study several case studies, critically analyse them and answer a number of open-ended questions. They also have to use security tools to investigate the given scenarios and demonstrate the effects of cybersecurity on ethical and legal compliance and the social impact of cybersecurity breaches.
The purpose of this assessment is to test the students’ grasp of the theoretical and soft skills (critical thinking, evaluation skills and understanding of relevant tools) aspects of the unit.
Submission Type: Individual
Assessment Method: Assignment Report
Artefact: Written response to assignment questions
50%
Learning and teaching strategy and rationale
The teaching and learning strategy is built on a “student-focused approach”. ACU’s teaching policy focuses on learning outcomes for students. Our teaching aims to engage students as active participants in the learning process while acknowledging that all learning must involve a complex interplay of active and receptive processes, the constructing of meaning for oneself, and learning from others. ACU promotes and facilitates learning that is autonomous and self-motivated, is characterised by the individual taking satisfaction in the mastering of content and skills and is critical, looking beneath the surface level of information for the meaning and significance of what is being studied.
The schedule of the workshops is designed in such a way that students can achieve intended learning outcomes sequentially. Teaching and learning activities will apply the experiential learning model, which encourages students to apply higher order thinking. The unit ensures that learning activities involve real-world scenarios that in turn assist with ‘real-world’ preparedness. The unit also uses a scaffolding technique that builds a student’s skills and prepares them for the next phase of the learning process.
Students should anticipate undertaking 150 hours of study for this unit, including class attendance, readings, online forum participation and assessment preparation.
Mode of delivery: This unit is offered in different modes. These are: “Attendance” mode, “Multi” mode and “Online” mode. This unit is offered in three modes to cater to the learning needs and preferences of a range of participants and maximise effective participation for isolated and/or marginalised groups.
Attendance Mode
In a weekly attendance mode, students will require face-to-face attendance in specific physical location/s. Students will have face-to-face interactions with lecturer(s) to further their achievement of the learning outcomes. This unit is structured with required upfront preparation before workshops, most students report that they spend an average of one hour preparing before the workshop and one or more hours after the workshop practicing and revising what was covered. The online learning platforms used in this unit provide multiple forms of preparatory and practice opportunities for you to prepare and revise.
Multi-Mode
In a multi-mode, students will require intermittent face-to-face attendance determined by the School. Students will have face-to-face interactions with lecturer(s) to further their achievement of the learning outcomes. This unit is structured with required upfront preparation before workshops. The online learning platforms used in this unit provide multiple forms of preparatory and practice opportunities for you to prepare and revise.
Online Mode
In an Online mode, students are given the opportunity to attend facilitated synchronous online seminar classes with other students and participate in the construction and synthesis of knowledge, while developing their knowledge. Students are required to participate in a series of online interactive workshops which include activities, knowledge checks, discussion and interactive sessions. This approach allows flexibility for students and facilitates learning and participation for students with a preference for virtual learning.