University of Technology Sydney

420107 Cybersecurity Analytics and Insights

Warning: The information on this page is indicative. The subject outline for a particular session, location and mode of offering is the authoritative source of all information about the subject for that offering. Required texts, recommended texts and references in particular are likely to change. Students will be provided with a subject outline once they enrol in the subject.

Subject handbook information prior to 2022 is available in the Archives.

UTS: Information Technology: Computer Science
Credit points: 6 cp
Result type: Grade and marks

There are course requisites for this subject. See access conditions.

Description

This subject introduces cybersecurity analytics techniques to students. Students solve cybersecurity problems using data analytics. Students apply their technical capabilities in data analytics, and develop communication skills and awareness of ethical and legal constraints. Students also have the opportunity to investigate socio-cultural, policy and legislative cybersecurity decision-making.

Subject learning objectives (SLOs)

Upon successful completion of this subject students should be able to:

1. Interrogate cybersecurity policy and decision making to address gaps. 
2. Identify security vulnerabilities using data analytics
3. Apply data analytics techniques to defend systems, application, or services. 
4. Design approaches to mitigate cybersecurity breaches and contingencies. 

Course intended learning outcomes (CILOs)

This subject also contributes specifically to the development of the following Course Intended Learning Outcomes (CILOs):

  • Socially Responsible: FEIT graduates identify, engage, and influence stakeholders, and apply expert judgment establishing and managing constraints, conflicts and uncertainties within a hazards and risk framework to define system requirements and interactivity. (B.1)
  • Design Oriented: FEIT graduates apply problem solving, design thinking and decision-making methodologies in new contexts or to novel problems, to explore, test, analyse and synthesise complex ideas, theories or concepts. (C.1)
  • Technically Proficient: FEIT graduates apply theoretical, conceptual, software and physical tools and advanced discipline knowledge to research, evaluate and predict future performance of systems characterised by complexity. (D.1)

Teaching and learning strategies

Students will spend 6 weeks undertaking learning and assessment activities for this subject. All subject components are undertaken online, and learning strategies include online activities as described, designated activities in the practical sessions, assessment tasks, readings and study time. The feedback of each assignment will be provided in two weeks after the due date.

Assessment

Assessment task 1: ?Cybersecurity policy analysis

Intent:

The aim of this assessment is to analyse a cybersecurity policy that we have provided.?You will further estimate the maturity of the policy based on the Capability Maturity Model.??

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

1

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

B.1

Type: Report
Groupwork: Individual
Weight: 15%
Length:

500?words (+/- 10%)?

Assessment task 2: Data analysis?

Intent:

The aim of this assessment is to demonstrate your ability?with?data collection,?pre-processing and data analytics. This?task is?integral in identifying security issues?on the network.?

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

2 and 3

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

D.1

Type: Design/drawing/plan/sketch
Groupwork: Individual
Weight: 40%
Length:

Output?at least 2 figures (+ description of the two figures and how they?were created)

Assessment task 3: Intrusion detection and?privacy?report?

Intent:

The aim of this assessment is to design adversarial?samples?and?privacy models to?solve the?security?challenges from the option you have been working with.?You will describe?how?you?generate adversarial?samples?and?how to design privacy models?to fit the requirements.???

Objective(s):

This assessment task addresses the following subject learning objectives (SLOs):

4

This assessment task contributes to the development of the following Course Intended Learning Outcomes (CILOs):

C.1

Type: Report
Groupwork: Individual
Weight: 45%
Length:

3000?words (+/- 10%)?

Minimum requirements

In order to pass the subject, a student must achieve an overall mark of 50% or more.