| |
13008 (v.3) Electronic Commerce (Internet Security) 304
Area: | School of Information Systems |
Credits: | 25.0 |
Contact Hours: | 3.0 |
Laboratory: | 1 x 1.5 Hours Weekly |
Seminar: | 1 x 1.5 Hours Weekly |
Prerequisite(s): | 12212 (v.4) Electronic Commerce (Electronic Commerce Technologies) 203 or any previous version
AND
13006 (v.4) Electronic Commerce (Web Site Management) 303 or any previous version
|
Syllabus: | Computer and internet security principles, examination of risk identification, network firewalls, proxy applications, screened sub-nets, providing unsecured services, air gap networks, non-Internet protocol connection, external access, World Wide Web security issues, funds transfer issues, other application specific security issues, the role of audit and the internet crime investigation to prosecution process. |
|
Unit Outcomes: | On successful completion of this unit, students will have - Improved awareness of basic computer and internet security principles. Developed skills in using appropriate security software. Improved understanding of the impacts and implications to businessof applying basic computer and internet security principles. Developed understanding in the latest developments in this subject. |
Texts and references listed below are for your information only and current as of September 30, 2003. Some units taught offshore are modified at selected locations. Please check with the unit coordinator for up-to-date information and approved offshore variations to unit information before finalising study and textbook purchases. |
Unit References: | Alexander, Michael (1997), Net Security: Your Digital Doberman, United States of America, Ventana Communications. Atkins. Derek, Buis. Paul, Hare. Chris, Kelley. Robert, Nachenberg. Carey, Nelson. Anthony. B, Phillips. Paul, Ritchey. Tim, Sheldon. Tom, and Snyder. Joel. (1997), Internet Security Professional Reference - Second Edition, United Stated of United States of America, New Riders Publishing. Pipkin. Donald. L (1997), Halting the Hacker: A Practical Guide to Computer Security, United States of America, Prentice Hall. Rubin. Aviel, D, Geer. Daniel, and Ranum, Marcus. J (1998), Web Security SourceBook: A Complete Guide to Web Security Threats and Solutions, United States of America, John Wiley and Sons. Stein. Lincoln. D. (1998), Web Security: A Step by Step Reference Guide, United States of America, Addison Wesley Longman Inc. Computer Security Journal (Available at Edith Cowan (Mt Lawley Campus) - S658.478 COM and at Curtin - P005 07893). Information Management and Computer Security (Available at Edith Cowan (Churchland's Campus)- S658.4038 INF). |
Unit Texts: | King. Christopher. M, Dalton. Curtis.E and Osmanoglu. Ertem. T (2001), Security Architecture - Design Deployment and Operations, California, McGraw Hill. Alternatives to the above textbook are - Bernstein. Terry, Bhimani. Anish, Schultz. Eugene and Siegel. Carol (1996), Internet Security for Business, United States of America, John Wiley and Sons. Ford. Warwick and Baum. S. Michael (2000), Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, Upper Saddle River, Prentice Hall. |
|
Unit Assessment Breakdown: | Continuous Assessment 50%.Examination 50%. This is by grade/mark assessment. |
Field of Education: |  20300 Information Systems (Narrow Grouping) | HECS Band (if applicable): | 2   |
|
Extent to which this unit or thesis utilises online information: |  Essential   | Result Type: |  Grade/Mark |
|
Availability
Year | Location | Period | Internal | Area External | Central External | 2004 | Bentley Campus | Semester 2 | Y | | | 2004 | Miri Sarawak Campus | Semester 1 | Y | | | 2004 | UHK SPACE Admiralty Ctr | Trimester 1A | Y | | |
Area External | refers to external course/units run by the School or Department, offered online or through Web CT, or offered by research. |
Central External | refers to external course/units run through the Curtin Bentley-based Distance Education Area |
|
Click here for a printable version of this page
|
|
|
|