Unit rationale, description and aim
In today’s interconnected world, existing and emerging threats to privacy and security are of ever-growing concern and are no longer only concerns for IT professionals. Every individual, from students and employees to business owners, is at risk of a continuous stream of cyber threats. These threats, which encompass phishing scams, malware infections, data breaches, identity theft, and other forms of cyberattacks, can lead to significant personal and financial consequences for both individuals and businesses. Therefore, understanding the nature of security threats and being knowledgeable about the techniques and tools to counteract these threats is an essential skill for everyone.
This unit provides students with a foundational understanding of security concepts and the landscape of cybersecurity threats. It offers an introduction to strategies and tools that can help avoid common cyber threats, such as phishing emails, malware infections, and data breaches. Students will also explore the ethical and legal dimensions of cybersecurity, including issues surrounding data privacy and intellectual property rights.
The primary aim of this unit is to highlight the critical importance of cybersecurity awareness and to equip students with the knowledge and skills necessary to protect themselves and their information in the digital landscape.
Campus offering
No unit offerings are currently available for this unit.Learning outcomes
To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.
Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.
Explore the graduate capabilities.
Apply the knowledge on security and cybersecurity ...
Learning Outcome 01
Identify cyber threats and the consequences of cyb...
Learning Outcome 02
Apply the skills required to manage cyber threats
Learning Outcome 03
Examine cybersecurity solutions and technologies u...
Learning Outcome 04
Content
Topics will include:
· Security and cybersecurity concepts and foundations
· The importance of cybersecurity
· Cyber vulnerabilities, threats, and attacks
· Consequences of cybersecurity failures
· The ethical and legal dimensions of cybersecurity
· Knowledge and skills required for managing cyber threats
· Innovative cybersecurity solutions and technologies to prevent cyber threats
Assessment strategy and rationale
The assessment strategy is designed to progressively develop students’ knowledge and skills in cybersecurity, ensuring alignment with learning outcomes. To pass this unit, students must achieve an aggregate mark of at least 50% across all assessments.
The first assessment is a reflective report, which will provide an opportunity for students to apply their cybersecurity knowledge in a practical context, demonstrating their understanding of cybersecurity threats and the implications of inadequate security practices.
The second assessment is an analytical report, requiring students to overview cyber threats and the consequences of cybersecurity failures, and demonstrate the solution they have implemented using the available AI tools for the assessment.
The final assessment is a real-world case study analysis, requiring students to apply cybersecurity principles and critically evaluate innovative solutions within an industry context. This task reinforces their understanding of cyber threats, management strategies, and emerging technologies while developing their ability to propose actionable recommendations.
All assessments are marked using rubrics aligned with learning outcomes. Students must demonstrate competency in cybersecurity concepts, application, and critical thinking to successfully complete the unit.
Overview of assessments
Assessment 1: Reflective report Students ...
Assessment 1: Reflective report
Students prepare a 800-word report analysing their daily online activities and the security measures on their devices. The report will involve reviewing and assessing their online behavior to identify potential weaknesses and threats. Students will then evaluate the risks associated with the security gaps and consider the potential consequences if such vulnerabilities were exploited. Additionally, the report will require students to identify the knowledge and skills needed to address these risks effectively. This assessment provides an opportunity for students to apply their cybersecurity knowledge in a practical context, demonstrating their understanding of cybersecurity threats and the implications of inadequate security practices.
20%
Assessment 2: Analytical report (1200 w...
Assessment 2: Analytical report (1200 words)
As part of this assessment task, students will overview cyber threats and the consequences of cybersecurity failures, including the financial, emotional, and reputational impacts on individuals and organisations. The student will pick an organisation to contextualie their consequences.
Students are required to submit the program demonstrating the solution they have implemented using the available AI tools for the assessment.
35%
Assessment 3: Case study (1600 words) Stude...
Assessment 3: Case study (1600 words)
Students will analyse a case study focused on a cybersecurity scenario and develop a risk mitigation plan. This task requires identifying security weaknesses, proposing solutions that integrate current security technologies, and considering ethical and legal implications. In a 1600-word report, students will present their findings and recommendations in a report, demonstrating their ability to translate cybersecurity knowledge into practical strategies.
45%
Learning and teaching strategy and rationale
Students should anticipate undertaking 150 hours of study for this unit over a twelve-week semester or equivalent study period, including class attendance, readings, online forum participation and assessment preparation.
This unit may be offered in “Attendance” and/or “Online” mode to cater for the learning needs and preferences of a range of participants.
Attendance Mode
Students will require face-to-face attendance in blocks of time determined by the school. Students will have face-to-face interactions with lecturer(s) to further their achievement of the learning outcomes. This unit is structured with required upfront preparation before workshops. The online learning platforms used in this unit provide multiple forms of preparatory and practice opportunities for students to prepare and revise.
Online Mode
This unit utilises an active learning approach whereby students will engage in e-module activities, readings and reflections, and opportunities to collaborate with peers in an online environment. This can involve, but is not limited to, online workshops, online discussion forums, chat rooms, guided reading, and webinars. Pre-recorded lectures will be incorporated within the online learning environment and e-modules. In addition, electronic readings will be provided to guide students’ reading and extend other aspects of online learning