USQ Logo
The current and official versions of the course specifications are available on the web at
Please consult the web for updates that may occur during the year.

CIS2005 Principles of Information Security

Semester 2, 2021 Toowoomba On-campus
Short Description: Principles of Info Security
Units : 1
Faculty or Section : Faculty of Business, Education, Law and Arts
School or Department : School of Business
Student contribution band : Band 2
ASCED code : 029901 - Security Science
Grading basis : Graded


Examiner: Michael Lane


Pre-requisite: CSC1401

Other Requisites

Students are required to have access to a personal computer, e-mail capabilities and Internet access to UConnect. Current details of computer requirements can be found at


Students entering the Information Communications and Technology profession need to develop a good understanding of the importance of information security for organisations and society. Students must have a good working knowledge of the role of information security in providing an appropriate level of confidentiality, integrity and availability while considering the legal, privacy and ethical implications. Students need to develop the knowledge and skills while using a range of security technologies and tools to identify potential threats and vulnerabilities that may exist in business systems and networks and manage security architecture and design and the associated risks and legal, privacy and ethical issues that may rise. This course provides students with an intermediate knowledge of the key principles necessary for managing the security of business information systems and networks.


Students study contemporary information security theory and practice in the context of threats, attacks and vulnerabilities that may exist in business systems and networks and the security controls that can be put in place to ensure that the risks are managed at an acceptable level. Students will develop their skills and knowledge so that they can evaluate information security situations. They will be able to identify specific threats, attacks, vulnerabilities, and manage security architecture and design legal, privacy or ethical issues that may arise. They will be able to clearly communicate and propose recommendations to manage the risks. Students will be assessed on their understanding of key concepts of information security and their ability to apply and communicate effectively contemporary information security theory and practice to real world problems in the assignments and the final examination.


On successful completion of this course, students should be able to:

  1. analyse information security threats, attacks and vulnerabilities and determine appropriate security architecture, design and controls that can be applied to mitigate the potential risks;
  2. describe the role of disaster recovery and business continuity plans in recovering information and operational systems when systems and hardware fail;
  3. describe why legal privacy and ethical issues play an important part in effectively managing information security;
  4. communicate effectively written and orally about the management of information security in organisations.


Description Weighting(%)
1. Threats, attacks and vulnerabilities 20.00
2. Legal, Ethical and Privacy Issues 5.00
3. Security technologies and tools 16.00
4. Security architecture and design 20.00
5. Identity and access management 15.00
6. Risk management 13.00
7. Cryptography and public key encryption 11.00

Text and Materials

ALL textbooks and materials available to be purchased can be sourced from USQ's Online Bookshop (unless otherwise stated). (

Please contact us for alternative purchase options from USQ Bookshop. (

Conklin, WMA & White, G 2018, Principles of computer security: CompTIA security+ and beyond (exam SY0-501), 5th edn, McGraw-Hill, New York.
(includes CD.)
All students will need access to a PC word processing and spreadsheet package. Any package will suffice.
Students also need MS Windows to view multimedia materials.

Reference Materials

Reference materials are materials that, if accessed by students, may improve their knowledge and understanding of the material in the course and enrich their learning experience.
Cheswick, WR, Bellovin, SM & Rubin, AD 2003, Firewalls and Internet security: repelling the wily hacker, 2nd edn, Addison-Wesley, Boston, Massachusetts.
Pfleeger, CP & Pfleeger, SL 2015, Security in computing, 5th edn, Prentice Hall, Upper Saddle River, New Jersey.
Stewart, J 2017, CompTIA Security+ review guide: exam SY0-501, 4th edn, John Wiley, Indianapolis, Indiana.
Whitman, M & Mattford, H 2017, Principles of information security, 6th edn, Course Technology, Boston, Massachusetts.

Student Workload Expectations

Activity Hours
Directed Study 52.00
Independent Study 113.00

Assessment Details

Description Marks out of Wtg (%) Due Date Notes
QUIZ 1 100 10 09 Aug 2021
ASST 2 - ORAL PRESENTATION 100 30 27 Aug 2021
ASST 3 - WRITTEN CASE STUDY 100 40 11 Oct 2021
QUIZ 2 100 20 21 Oct 2021

Important assessment information

  1. Attendance requirements:
    Online: There are no attendance requirements for this course. However, it is the students' responsibility to study all material provided to them or required to be accessed by them to maximise their chance of meeting the objectives of the course and to be informed of course-related activities and administration.

    On-campus: It is the students' responsibility to attend and participate appropriately in all activities (such as lectures, tutorials, laboratories and practical work) scheduled for them, and to study all material provided to them or required to be accessed by them to maximise their chance of meeting the objectives of the course and to be informed of course-related activities and administration.

  2. Requirements for students to complete each assessment item satisfactorily:
    To satisfactorily complete an individual assessment item a student must achieve at least 50% of the marks. (Depending upon the requirements in Statement 4 below, students may not have to satisfactorily complete each assessment item to receive a passing grade in this course.)

  3. Penalties for late submission of required work:
    Students should refer to the Assessment Procedure (point 4.2.4)

  4. Requirements for student to be awarded a passing grade in the course:
    To be assured of receiving a passing grade a student must achieve at least 50% of the total weighted marks available for the course.

  5. Method used to combine assessment results to attain final grade:
    The final grades for students will be assigned on the basis of the aggregate of the weighted marks obtained for each of the summative assessment items in the course.

  6. Examination information:
    There is no examination for this course.

  7. Examination period when Deferred/Supplementary examinations will be held:
    Deferred and Supplementary examinations will be held in accordance with the Assessment Procedure

  8. University Student Policies:
    Students should read the USQ policies: Definitions, Assessment and Student Academic Misconduct to avoid actions which might contravene University policies and practices. These policies can be found at

Assessment Notes

  1. Referencing in assignments:
    Harvard (AGPS) is the referencing system required in this course. Students should use Harvard (AGPS) style in their assignments to format details of the information sources they have cited in their work. The Harvard (AGPS) style to be used is defined by the USQ Library's referencing guide at

Date printed 8 November 2021