Unit rationale, description and aim

In an increasingly digital world, where the ability to safeguard information and systems is critical to professional success and societal resilience, this unit equips students with essential knowledge and skills in cyber security. It covers the importance of cyber security, security threats, risk analysis and mitigation techniques. The unit demonstrates the basic cyber security concepts, security tools, cryptographic schemes, and the common architectures used as industry standards. Students will learn how to defend against cyber threats and attacks and study existing techniques for managing and mitigating security issues and maintaining the working environment. This unit introduces the broad discipline of cyber security and outlines how to ensure data confidentiality, privacy, integrity, authenticity, and availability of information. It also covers social, ethical, and legal issues in cyber-space to understand how cyber security affects legal compliance and solidarity in communities and society. The aim of this unit is to provide students with essential background knowledge in cyber security and develop practical skills, that will help them to understand advanced cyber security topics.

2026 10

Campus offering

Find out more about study modes.

Unit offerings may be subject to minimum enrolment numbers.

Please select your preferred campus.

  • Term Mode
  • Semester 1Campus Attendance
  • Term Mode
  • ACU Term 1Online Unscheduled
  • ACU Term 3Online Unscheduled

Prerequisites

Nil

Incompatible

ITEC640 Information Systems Security

Learning outcomes

To successfully complete this unit you will be able to demonstrate you have achieved the learning outcomes (LO) detailed in the below table.

Each outcome is informed by a number of graduate capabilities (GC) to ensure your work in this, and every unit, is part of a larger goal of graduating from ACU with the attributes of insight, empathy, imagination and impact.

Explore the graduate capabilities.

Identify vulnerabilities and potential security th...

Learning Outcome 01

Identify vulnerabilities and potential security threats in information systems and analyse their consequences in real‑world situations in collaboration with peers
Relevant Graduate Capabilities: GC1, GC7

Apply appropriate security tools to safeguard data...

Learning Outcome 02

Apply appropriate security tools to safeguard data, systems and networks from malicious attacks
Relevant Graduate Capabilities: GC2, GC10

Critically evaluate the consequences of security t...

Learning Outcome 03

Critically evaluate the consequences of security threats in an organisation and propose appropriate security countermeasures to minimise the impacts or likelihood of risks.
Relevant Graduate Capabilities: GC2, GC4

Appraise the impact of cyber security threats acro...

Learning Outcome 04

Appraise the impact of cyber security threats across societies and national borders
Relevant Graduate Capabilities: GC1, GC9

Content

Topics will include:

  • Introduction to Cyber Security
  • Cybersecurity cube
  • Threats, vulnerabilities, attacks
  • Protecting secrets
  • Risk assessment and management
  • Ensuring Integrity
  • Access control
  • Protecting a CS domain
  • Becoming a CS specialist
  • Legal, privacy and ethical issues
  • Impacts of cyber attacks

Assessment strategy and rationale

A range of assessment procedures will be used to meet the unit learning outcomes and develop graduate attributes consistent with University assessment requirements. The first assessment provides students with an opportunity to apply their theoretical knowledge and gain practical skills. In assessment task 2, students will critically analyse a recent security breach and investigate the cause of breach and will also apply their knowledge to propose an appropriate security solution. The last assessment provides students with an opportunity to apply theoretical knowledge and assess risk for a cyber physical system using standard risk analysis models.

To pass this unit, students must demonstrate competence in all learning outcomes and achieve an aggregate mark of at least 50%. Marking will be in accordance with a rubric specifically developed to measure students’ level of achievement of the learning outcomes for each item of assessment. Students will be awarded a final grade which signifies their overall achievement in the unit.

Overview of assessments

Task 1: Developmental assessment This assessment...

Task 1: Developmental assessment

This assessment consists of hands-on exercises where students are required to apply different security tools and techniques to solve practical problems. The feedback from this assessment will help students to be ready to apply the concepts in the consequent assessments.

Submission Type: Individual

Assessment Method: Practical task

Artefact: program files/code + report (500 words)

Weighting

20%

Learning Outcomes LO2, LO3
Graduate Capabilities GC2, GC10

Task 2: Presentation on a recent data breach The...

Task 2: Presentation on a recent data breach

The purpose of this task is to develop students’ critical thinking and reflective analysis of contemporary cyber security issues. This report has to be based on a recent cyber-attack.


50% Group (collective) mark – awarded for the overall quality of the group work.

50% Individual mark – awarded based on each student’s demonstrated contribution..

Submission Type: Group

Assessment Method: Presentation

Artefact: Live / Recorded with face-overlay Presentation (8 minutes) + Online Viva + reflective groups work and individual contribution

Weighting

30%

Learning Outcomes LO2, LO3
Graduate Capabilities GC2, GC4, GC10

Task 3: Report & Presenatation on threat clas...

Task 3: Report & Presenatation on threat classification & risk assessment

Students are required to produce a report demonstrating their critical analysis of threat classification and risk assessment. Using the STRIDE and DREAD security models, they will identify and evaluate the risk factors associated with an IT or information system. The report must also include a critical examination of the broader societal and cross‑border impacts of cybersecurity threats.

As part of this task, students will use Generative AI tools to support the development of their presentation and will reflect on the effectiveness and limitations of these tools.

 The purpose of this assessment is to assess students’ critical and analytical ability to delve into complex concepts about cyber security through reflection and collaboration.

Submission Type: Individual

Assessment Method: Written Report and Presentation

Artefact: Written report (1200 words) + Live / Recorded with face-overlay Presentation (8 minutes) + Online Viva

Weighting

50%

Learning Outcomes LO1, LO2, LO3, LO4
Graduate Capabilities GC1, GC2, GC7, GC9, GC10

Learning and teaching strategy and rationale

This unit is delivered through Attendance and Online modes using a single, integrated learning and teaching strategy designed to ensure equivalent learning outcomes and a comparable learning experience for all students, while supporting diverse learning needs and maximising access.

Across both modes, learning activities are intentionally aligned to the unit learning outcomes and assessment tasks, and are underpinned by active learning, guided engagement with disciplinary knowledge, opportunities for peer interaction, and regular, timely feedback. While the mode of delivery shapes how students participate, the pedagogical intent, expectations and standards remain consistent.

In Attendance mode, students engage in weekly face-to-face classes at designated locations, supported by preparatory activities prior to workshops and opportunities for consolidation following classes. Online learning platforms are used to complement face-to-face teaching through additional resources and learning activities.

In Online mode, students engage with the same core content and learning outcomes through a combination of synchronous and asynchronous activities, including structured discussions and applied learning tasks that support learning in professional contexts.

Across both delivery modes, students should plan to commit approximately 150 hours to this unit over the semester, including participation in learning activities, independent study, readings and assessment preparation.

Representative texts and references

Representative texts and references

Anderson, R 2020, Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd edn, Wiley.

Stallings, W. (2023). Cryptography & network security: Principles and practice (8th ed., Global ed.). Pearson Education.

Stallings, W., & Brown, L. (2023). Computer security: Principles and practice (5th ed.). Pearson Education.

Whitman, M. E., & Mattord, H. J. (2020). Principles of information security (7th ed.). Cengage Learning.

van Oorschot, P. C. (2021). Computer security and the internet: Tools and jewels from malware to bitcoin (2nd ed.). Springer.

Kaufman, C., Perlman, R., Speciner, M., & Perlner, R. (2022). Network security: Private communication in a public world (3rd ed.). Pearson Education.

Easttom, W. C. (2023). Computer security fundamentals (5th ed.). Pearson IT Certification / Pearson Education.

Paar, C., Pelzl, J., & Güneysu, T. (2024). Understanding cryptography: From established symmetric and asymmetric ciphers to post-quantum algorithms (2nd ed.). Springer.

Weissman, J. S. (2022). Principles of computer security: CompTIA Security+ and beyond lab manual (5th ed.). McGraw-Hill Education.

Santos, H. M. D. (2022). Cybersecurity: A practical engineering approach (1st ed.). Chapman & Hall/CRC (Taylor & Francis / Routledge).

Locations
Credit points
Year

Have a question?

We're available 9am–5pm AEDT,
Monday to Friday

If you’ve got a question, our AskACU team has you covered. You can search FAQs, text us, email, live chat, call – whatever works for you.

Live chat with us now

Chat to our team for real-time
answers to your questions.

Launch live chat

Visit our FAQs page

Find answers to some commonly
asked questions.

See our FAQs