books-library-folders

Area/Catalogue
COMP 5075

graduate-cap

Course Level
Postgraduate

globe-earth-geography

Offered Externally
No

diploma-certificate-graduate-degree

Course ID
172216

pie-chart-graph

Unit Value
4.5

compass

University-wide elective course
No

calendar-2
Timetable/s

This class has not been
timetabled for year 2024.

Course owner

Course owner
UniSA STEM

Course aim

To design, analyse and implement effective security for telecommunication devices and systems.

Course content

Overview of frameworks for threat assessment (e.g., MITRE ATT&CK and MITRE ATLAS) and threat mitigation (e.g., NIST Cybersecurity Framework, MITRE D3FEND, Lockheed Martin's Cyber Kill Chain, Systems Security Engineering Framework, ISO/IEC/IEEE 15288).

Device security at the hardware level: hardware-enabled security and platform trust, common vulnerabilities (top CWEs), common attacks (e.g., hardware trojan, side-channel analysis), common defences (e.g., physical unclonable function, trusted computing technologies including Trusted Platform Module and Trusted Execution Environment).

Device security at the software level: common vulnerabilities (top CWEs, OWASP top 10), common attacks (cyber threat trends), common defences (e.g., safe programming languages, application security testing, verified microkernels), novel attacks and emerging defences (e.g., adversarial machine learning).

Network security at the physical layer (electronic warfare and physical-layer security), data link layer (reactive jamming, cognitive anti-jamming), network layer (L3 distributed denial of service, attacks on routing and countermeasures), and upper layers (L4 and L4 distributed denial of service, protocol verification using formal methods, cryptographic protocols).

Specific focus on two security measures: (i) quantum key distribution, (ii) threat detection using security information and event management (SIEM) and machine learning.

Examples drawn from the latest developments in space networks, including Solar System Internetwork as well as other CCSDS-defined architectures and protocols.

Textbook(s)

Nil

Prerequisite(s)

Specific program
Program Subject Area & Catalogue Number Course Name
LMEL COMP 5074 Cryptography and Data Protection

Corequisite(s)

Nil

Teaching method

Component Duration
INTERNAL, MAWSON LAKES
Lecture 2 hours x 13 weeks
Tutorial 2 hours x 13 weeks
Practical 3 hours x 3 weeks

Note: These components may or may not be scheduled in every study period. Please refer to the timetable for further details.


Assessment

Learning log/Journal, Practical

Fees

EFTSL*: 0.125
Commonwealth Supported program (Band 2)
To determine the fee for this course as part of a Commonwealth Supported program, go to:
How to determine your Commonwealth Supported course fee. (Opens new window)

Fee-paying program for domestic and international students
International students and students undertaking this course as part of a postgraduate fee paying program must refer to the relevant program home page to determine the cost for undertaking this course.

Non-award enrolment
Non-award tuition fees are set by the university. To determine the cost of this course, go to:
How to determine the relevant non award tuition fee. (Opens new window)

Not all courses are available on all of the above bases, and students must check to ensure that they are permitted to enrol in a particular course.

* Equivalent Full Time Study Load. Please note: all EFTSL values are published and calculated at ten decimal places. Values are displayed to three decimal places for ease of interpretation.

Course Coordinators

Degrees this course is offered in

Checking your eligibility