she5imh inside the mind of a hacker

INSIDE THE MIND OF A HACKER

SHE5IMH

2020

Credit points: 15

Subject outline

This subject explores the motivations, mindset and techniques used by hackers. Although their activities are illicit and illegal, hackers have a finely attuned understanding of computer networks and systems and how users/customers behave in online environments. If nothing else, they have developed new - albeit illegal and unethical business models that exploit vulnerabilities in computer networks and systems. By looking at systems and practices through the eyes of a hacker, you can better identify weaknesses, emerging threats and develop more effective defences.

SchoolEngineering and Mathematical Sciences (Pre 2022)

Credit points15

Subject Co-ordinatorAlex Ng

Available to Study Abroad/Exchange StudentsYes

Subject year levelYear Level 5 - Masters

Available as ElectiveNo

Learning ActivitiesN/A

Capstone subjectNo

Subject particulars

Subject rules

Prerequisites Must be admitted into SMCYC or SMCYL or SMCYB or must obtain subject coordinator's approval

Co-requisitesN/A

Incompatible subjectsN/A

Equivalent subjectsN/A

Quota Management StrategyN/A

Quota-conditions or rulesN/A

Special conditionsN/A

Minimum credit point requirementN/A

Assumed knowledgeN/A

Career Ready

Career-focusedNo

Work-based learningNo

Self sourced or Uni sourcedN/A

Entire subject or partial subjectN/A

Total hours/days requiredN/A

Location of WBL activity (region)N/A

WBL addtional requirementsN/A

Graduate capabilities & intended learning outcomes

Graduate Capabilities

Intended Learning Outcomes

01. Critically analyse typologies of hackers, their mindsets and the motivations behind hacking.
02. Critically analyse the various tactics that hackers use in breaching communication networks.
03. Deconstruct and critically analyse the profit models and value chain behind hackers' activities.
04. Critically evaluate standard business security practices from the viewpoint of a hacker.
05. Recommend processes and practices to reduce the likelihood of data breaches.

Subject options

Select to view your study options…

Start date between: and    Key dates

Melbourne (Bundoora), 2020, Semester 1, Day

Overview

Online enrolmentYes

Maximum enrolment sizeN/A

Subject Instance Co-ordinatorAlex Ng

Class requirements

Computer LaboratoryWeek: 10 - 22
One 2.00 hours computer laboratory per week on any day including weekend during the day from week 10 to week 22 and delivered via face-to-face.

LectureWeek: 10 - 22
One 2.00 hours lecture per week on any day including weekend during the day from week 10 to week 22 and delivered via face-to-face.

Assessments

Assessment elementCommentsCategoryContributionHurdle%ILO*

2 hour Exam (equiv to 2000 words)Students undertake an audit of an organisation and suggest ways in which organisations might be hacked.

N/AN/AN/ANo40SILO1, SILO2, SILO3, SILO4, SILO5

Defensive security report (equiv to 1500 words)Students undertake an audit of an organisation and suggest ways in which organisations can be defended from hacks.

N/AN/AN/ANo30SILO1, SILO2, SILO3, SILO4, SILO5

Online profile report (equiv to 1000 words)Students research their own online footprint and determine ways in which that can be exploited.

N/AN/AN/ANo20SILO1, SILO2, SILO4, SILO5

6 x 5 min online quizzes (equiv to 500 words)Best of 5 quiz results taken. Each quiz worth 2% each.

N/AN/AN/ANo10SILO1, SILO2