cse1acf cyber algorithms that changed the future
CYBER ALGORITHMS THAT CHANGED THE FUTURE
CSE1ACF
2019
Credit points: 15
Subject outline
This subject introduces core algorithms in cybersecurity that support confidentiality, integrity and availability in information systems. Students will be exposed to the conception, design and implementation processes for new algorithms as they relate to cybersecurity. Real-world case studies from intelligence analysis, fraud, databases, networks and firewalls will be used to illustrate how algorithms can be applied to solve problems. This subject does not require prior knowledge of computer programming.
SchoolSchool Engineering&Mathematical Sciences
Credit points15
Subject Co-ordinatorPaul Watters
Available to Study Abroad StudentsNo
Subject year levelYear Level 1 - UG
Exchange StudentsNo
Subject particulars
Subject rules
PrerequisitesN/A
Co-requisitesN/A
Incompatible subjectsN/A
Equivalent subjectsN/A
Special conditionsN/A
Learning resources
Readings
Resource Type | Title | Resource Requirement | Author and Year | Publisher |
---|---|---|---|---|
Readings | Nine Algorithms That Changed The Future. | Prescribed | MacCormick, J. (2013) | Princeton University Press |
Graduate capabilities & intended learning outcomes
01. Demonstrate foundation knowledge in the latest algorithms for cybersecurity
- Activities:
- 2x2 hour lectures. Students provided with an introduction to algorithms and cybersecurity, including The security triad: Confidentiality, Integrity and Availability, Uses of Digital Forensics, and Understanding Digital Investigation Approach.
- Related graduate capabilities and elements:
- Literacies and Communication Skills(Quantitative Literacy,Cultural Literacy)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
- Personal and Professional Skills(Autonomy and independence,Ethical behaviour,Adaptability Skills,Study and Learning Skills)
- Personal and Professional Skills(Autonomy and independence,Ethical behaviour,Adaptability Skills,Study and Learning Skills)
- Personal and Professional Skills(Autonomy and independence,Ethical behaviour,Adaptability Skills,Study and Learning Skills)
02. Define requirements for cybersecurity algorithms and ordered steps in a formal language
- Activities:
- 2x2 hour lectures. Students provided with an introduction to Public Key Cryptography, including Asymmetric Ciphers, Key Exchange and Cryptanalysis. This will be followed by tutorials to discuss in-depth cryptanalysis.
- Related graduate capabilities and elements:
- Literacies and Communication Skills(Quantitative Literacy,Cultural Literacy)
- Literacies and Communication Skills(Quantitative Literacy,Cultural Literacy)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
03. Review algorithms in solving cybersecurity problems
- Activities:
- 2x2 hour lectures. Students provided with an introduction to Pattern Recognition, including Nearest-neighbor classifiers, Decision trees, Neural networks, Cluster analysis and Principal components analysis
- Related graduate capabilities and elements:
- Literacies and Communication Skills(Quantitative Literacy,Cultural Literacy)
- Literacies and Communication Skills(Quantitative Literacy,Cultural Literacy)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
- Personal and Professional Skills(Autonomy and independence,Ethical behaviour,Adaptability Skills,Study and Learning Skills)
04. Interpret the steps required to correctly execute an algorithm
- Activities:
- 2x2 hour lectures. Students provided with an introduction to Data Compression, including Lossless compression, Lossy compression, and Database Algorithms
- Related graduate capabilities and elements:
- Literacies and Communication Skills(Quantitative Literacy,Cultural Literacy)
- Literacies and Communication Skills(Quantitative Literacy,Cultural Literacy)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
05. Describe the performance, accuracy and reliability of algorithms using real-world data
- Activities:
- 2x2 hour lectures. Students provided with an introduction to Digital Signatures, including Authentication, Integrity and Non-repudiation, and Computability
- Related graduate capabilities and elements:
- Literacies and Communication Skills(Quantitative Literacy,Cultural Literacy)
- Literacies and Communication Skills(Quantitative Literacy,Cultural Literacy)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
- Inquiry and Analytical Skills(Critical Thinking,Creative Problem-solving,Inquiry/Research)
- Discipline -Specific Knowledge and Skills(Discipline-Specific Knowledge and Skills)
Subject options
Select to view your study options…
Melbourne, 2019, Semester 2, Day
Overview
Online enrolmentYes
Maximum enrolment sizeN/A
Enrolment information
Subject Instance Co-ordinatorPaul Watters
Class requirements
LectureWeek: 31 - 43
Two 1.0 hours lecture per week on weekdays during the day from week 31 to week 43 and delivered via face-to-face.
Computer LaboratoryWeek: 32 - 43
One 2.0 hours computer laboratory per week on weekdays during the day from week 32 to week 43 and delivered via face-to-face.
Assessments
Assessment element | Comments | % | ILO* |
---|---|---|---|
2 x 30 minute Lab quizzes (30 minutes each. Total equivalent to 1000 words) | 20 | 01, 02, 03, 04, 05 | |
Written report on algorithms in solving cybersecurity problems (equivalent to 500 words) | 10 | 02, 03 | |
Written report on the performance, accuracy & reliability of algorithms in Cyber (equiv 1000 words) | 20 | 05 | |
2 hour Examination | 50 | 01, 02, 03, 04, 05 |