Useful links
This unit will present the lessons from recent research and from case studies of practice to bring students the skills to assess and improve the security of deployed systems. A particular focus is on data-driven approaches to collect operational data about a systems security. We explore deployment issues at local and global scale, e. g. for X. 509, DNS, and BGP, and also take human factors explicitly into account. As a result, students will learn to put building blocks of security together in a sound way, to arrive at engineering solutions that are empirically verifiable, functional, and secure against realistic threats. As Dan Geer once famously said: Any security technology whose effectiveness cant be empirically determined is indistinguishable from blind luck.
Code | COMP5617 |
---|---|
Academic unit | Computer Science |
Credit points | 6 |
Prerequisites:
?
|
INFO3616 or ELEC5616 or CSEC3616 or CSEC5616 |
---|---|
Corequisites:
?
|
None |
Prohibitions:
?
|
COMP4617 |
At the completion of this unit, you should be able to:
Unit outlines will be available 1 week before the first day of teaching for the relevant session.
Key dates through the academic year, including teaching periods, census, payment deadlines and exams.
Enrolment, course planning, fees, graduation, support services, student IT
Code of Conduct for Students, Conditions of Enrollment, University Privacy Statement, Academic Integrity
Academic appeals process, special consideration, rules and guidelines, advice and support
Policy register, policy search
Scholarships, interest free loans, bursaries, money management
Learning Centre, faculty and school programs, Library, online resources
Student Centre, counselling & psychological services, University Health Service, general health and wellbeing