Search Course Outline

6 course outlines found

1

COMPSCI 725

: Usable Security and Privacy Engineering
2025 Semester Two (1255)
The human aspect of cyber security and privacy engineering is relevant to commercial solution development and cyber security and privacy research. Sample topics: secure systems design; usable security systems evaluation; privacy-preserving software systems; threat modelling; economics of usable security and privacy; OWASP Top 10 vulnerabilities. Recommended preparation: 30 points from COMPSCI 313, 314, 320, 335, 340, 351, 702, 734, 742
Subject: Computer Science
No pre-requisites or restrictions
2

COMPSCI 725

: Usable Security and Privacy Engineering
2024 Semester Two (1245)
The human aspect of cyber security and privacy engineering is relevant to commercial solution development and cyber security and privacy research. Sample topics: secure systems design; usable security systems evaluation; privacy-preserving software systems; threat modelling; economics of usable security and privacy; OWASP Top 10 vulnerabilities. Recommended preparation: 30 points from COMPSCI 313, 314, 320, 335, 340, 351, 702, 734, 742
Subject: Computer Science
No pre-requisites or restrictions
3

COMPSCI 725

: System Security
2020 Semester Two (1205)
Data security: confidentiality, integrity, availability. System security: prohibitions, permissions, obligations, exemptions. The gold standard of dynamic security: authentication, audit, authorisation. Governance: specification, implementation, assurance. Three-layer defence: prevention, detection, response. Control modalities: architectural, economic, legal, normative. System-centric analyses: attacks, threats, vulnerabilities, information flows. Owner-centric analyses: functionality, security, trust, distrust. Data-centric analyses. Security techniques: encryption, obfuscation, tamper resistance. System designs. Recommended preparation: 30 points from COMPSCI 313, 314, 320, 335, 340, 351, 702, 734, 742.
Subject: Computer Science
Prerequisite: Approval of the Academic Head or nominee
4

COMPSCI 725

: Usable Security and Privacy Engineering
2023 Semester Two (1235)
Data security: confidentiality, integrity, availability. System security: prohibitions, permissions, obligations, exemptions. The gold standard of dynamic security: authentication, audit, authorisation. Governance: specification, implementation, assurance. Three-layer defence: prevention, detection, response. Control modalities: architectural, economic, legal, normative. System-centric analyses: attacks, threats, vulnerabilities, information flows. Owner-centric analyses: functionality, security, trust, distrust. Data-centric analyses. Security techniques: encryption, obfuscation, tamper resistance. System designs. Recommended preparation: 30 points from COMPSCI 313, 314, 320, 335, 340, 351, 702, 734, 742.
Subject: Computer Science
Prerequisite: Approval of the Academic Head or nominee

Outline is not available yet

5

COMPSCI 725

: System Security
2022 Semester Two (1225)
Data security: confidentiality, integrity, availability. System security: prohibitions, permissions, obligations, exemptions. The gold standard of dynamic security: authentication, audit, authorisation. Governance: specification, implementation, assurance. Three-layer defence: prevention, detection, response. Control modalities: architectural, economic, legal, normative. System-centric analyses: attacks, threats, vulnerabilities, information flows. Owner-centric analyses: functionality, security, trust, distrust. Data-centric analyses. Security techniques: encryption, obfuscation, tamper resistance. System designs. Recommended preparation: 30 points from COMPSCI 313, 314, 320, 335, 340, 351, 702, 734, 742.
Subject: Computer Science
Prerequisite: Approval of the Academic Head or nominee

Outline is not available yet

6

COMPSCI 725

: System Security
2021 Semester Two (1215)
Data security: confidentiality, integrity, availability. System security: prohibitions, permissions, obligations, exemptions. The gold standard of dynamic security: authentication, audit, authorisation. Governance: specification, implementation, assurance. Three-layer defence: prevention, detection, response. Control modalities: architectural, economic, legal, normative. System-centric analyses: attacks, threats, vulnerabilities, information flows. Owner-centric analyses: functionality, security, trust, distrust. Data-centric analyses. Security techniques: encryption, obfuscation, tamper resistance. System designs. Recommended preparation: 30 points from COMPSCI 313, 314, 320, 335, 340, 351, 702, 734, 742.
Subject: Computer Science
Prerequisite: Approval of the Academic Head or nominee

Outline is not available yet