General Information
This subject introduces students to the international relations of digital technologies and builds their fundamental knowledge of how networks operate. State and non‑state actors have rapidly acquired the capacity to pursue power and disrupt adversaries through the cyber world. The infrastructure and processes of networks is explored providing theoretical and practical knowledge of how, why and where hacking is being employed. Individual, firm and state security is considered within this changed international environment of identity and credit card theft, malware, viruses, botnets, cyber-espionage, cyber-attacks and denial of service. Global cyber governance structures and standards are considered as well as states’ attempts to balance technological benefits against emergent threats through policy on issues studied (e.g. cyber war, data security, cloud computing, surveillance, government censorship, terrorism, hacking for defence, diplomacy and the intelligence community).
-
Details
Academic unit: Faculty of Society & Design Subject code: INTR11-102 Subject title: Hacking, Networks and Security Subject level: Undergraduate Semester/Year: September 2019 Credit points: 10.000 -
Delivery & attendance
Timetable: https://bond.edu.au/timetable Delivery mode: Standard Workload items: - Lecture: x12 (Total hours: 24) - No Description
- Tutorial: x12 (Total hours: 12) - No Description
- Personal Study Hours: x12 (Total hours: 84) - Recommended Study Hours
Attendance and learning activities: -
Resources
Prescribed resources: No Prescribed resources.
After enrolment, students can check the Books and Tools area in iLearn for the full Resource List.iLearn@Bond & Email: iLearn@Bond is the online learning environment at Bond University and is used to provide access to subject materials, lecture recordings and detailed subject information regarding the subject curriculum, assessment and timing. Both iLearn and the Student Email facility are used to provide important subject notifications. Additionally, official correspondence from the University will be forwarded to students’ Bond email account and must be monitored by the student. To access these services, log on to the Student Portal from the Bond University website as www.bond.edu.au
Academic unit: | Faculty of Society & Design |
---|---|
Subject code: | INTR11-102 |
Subject title: | Hacking, Networks and Security |
Subject level: | Undergraduate |
Semester/Year: | September 2019 |
Credit points: | 10.000 |
Timetable: | https://bond.edu.au/timetable |
---|---|
Delivery mode: | Standard |
Workload items: |
|
Attendance and learning activities: |
Prescribed resources: | No Prescribed resources. After enrolment, students can check the Books and Tools area in iLearn for the full Resource List. |
---|---|
iLearn@Bond & Email: | iLearn@Bond is the online learning environment at Bond University and is used to provide access to subject materials, lecture recordings and detailed subject information regarding the subject curriculum, assessment and timing. Both iLearn and the Student Email facility are used to provide important subject notifications. Additionally, official correspondence from the University will be forwarded to students’ Bond email account and must be monitored by the student. To access these services, log on to the Student Portal from the Bond University website as www.bond.edu.au |
Enrolment requirements
Requisites: |
Nil |
---|---|
Assumed knowledge: |
Assumed knowledge is the minimum level of knowledge of a subject area that students are assumed to have acquired through previous study. It is the responsibility of students to ensure they meet the assumed knowledge expectations of the subject. Students who do not possess this prior knowledge are strongly recommended against enrolling and do so at their own risk. No concessions will be made for students’ lack of prior knowledge.
|
Restrictions: |
Nil |
Assurance of learning
Assurance of Learning means that universities take responsibility for creating, monitoring and updating curriculum, teaching and assessment so that students graduate with the knowledge, skills and attributes they need for employability and/or further study.
At Bond University, we carefully develop subject and program outcomes to ensure that student learning in each subject contributes to the whole student experience. Students are encouraged to carefully read and consider subject and program outcomes as combined elements.
Program Learning Outcomes (PLOs)
Program Learning Outcomes provide a broad and measurable set of standards that incorporate a range of knowledge and skills that will be achieved on completion of the program. If you are undertaking this subject as part of a degree program, you should refer to the relevant degree program outcomes and graduate attributes as they relate to this subject.
Subject Learning Outcomes (SLOs)
On successful completion of this subject the learner will be able to:
- Have knowledge of how digital technologies are effecting international relations
- Have knowledge of how hacking is being achieved and how it may be restricted
- Have an understanding of how networks operate
- Have an ability to assess the digital technology security risks to individuals, firms and states
- Have gained the ability to contribute to the deliberation of internet technology and policy
- Have the capacity to mediate between technologists, administrators and government
Generative Artificial Intelligence in Assessment
The University acknowledges that Generative Artificial Intelligence (Gen-AI) tools are an important facet of contemporary life. Their use in assessment is considered in line with students’ development of the skills and knowledge which demonstrate learning outcomes and underpin study and career success. Instructions on the use of Gen-AI are given for each assessment task; it is your responsibility to adhere to these instructions.
-
Assessment details
Type Task % Timing* Outcomes assessed Computer-Aided Examination (Closed) This exam covers issues discussed in the subject throughout the semester. 40.00% Final Examination Period 1,2,3,4,5,6 Project Report Develop a 10 minute presentation and submit a 1000-word report which includes the analysis of the security issue and the recommendations of how to address it. 60.00% To Be Negotiated 1,2,3,4,5,6 - * Assessment timing is indicative of the week that the assessment is due or begins (where conducted over multiple weeks), and is based on the standard University academic calendar
- C = Students must reach a level of competency to successfully complete this assessment.
-
Assessment criteria
Assessment criteria
High Distinction 85-100 Outstanding or exemplary performance in the following areas: interpretative ability; intellectual initiative in response to questions; mastery of the skills required by the subject, general levels of knowledge and analytic ability or clear thinking. Distinction 75-84 Usually awarded to students whose performance goes well beyond the minimum requirements set for tasks required in assessment, and who perform well in most of the above areas. Credit 65-74 Usually awarded to students whose performance is considered to go beyond the minimum requirements for work set for assessment. Assessable work is typically characterised by a strong performance in some of the capacities listed above. Pass 50-64 Usually awarded to students whose performance meets the requirements set for work provided for assessment. Fail 0-49 Usually awarded to students whose performance is not considered to meet the minimum requirements set for particular tasks. The fail grade may be a result of insufficient preparation, of inattention to assignment guidelines or lack of academic ability. A frequent cause of failure is lack of attention to subject or assignment guidelines. Quality assurance
For the purposes of quality assurance, Bond University conducts an evaluation process to measure and document student assessment as evidence of the extent to which program and subject learning outcomes are achieved. Some examples of student work will be retained for potential research and quality auditing purposes only. Any student work used will be treated confidentially and no student grades will be affected.
Type | Task | % | Timing* | Outcomes assessed |
---|---|---|---|---|
Computer-Aided Examination (Closed) | This exam covers issues discussed in the subject throughout the semester. | 40.00% | Final Examination Period | 1,2,3,4,5,6 |
Project Report | Develop a 10 minute presentation and submit a 1000-word report which includes the analysis of the security issue and the recommendations of how to address it. | 60.00% | To Be Negotiated | 1,2,3,4,5,6 |
- * Assessment timing is indicative of the week that the assessment is due or begins (where conducted over multiple weeks), and is based on the standard University academic calendar
- C = Students must reach a level of competency to successfully complete this assessment.
Assessment criteria
High Distinction | 85-100 | Outstanding or exemplary performance in the following areas: interpretative ability; intellectual initiative in response to questions; mastery of the skills required by the subject, general levels of knowledge and analytic ability or clear thinking. |
---|---|---|
Distinction | 75-84 | Usually awarded to students whose performance goes well beyond the minimum requirements set for tasks required in assessment, and who perform well in most of the above areas. |
Credit | 65-74 | Usually awarded to students whose performance is considered to go beyond the minimum requirements for work set for assessment. Assessable work is typically characterised by a strong performance in some of the capacities listed above. |
Pass | 50-64 | Usually awarded to students whose performance meets the requirements set for work provided for assessment. |
Fail | 0-49 | Usually awarded to students whose performance is not considered to meet the minimum requirements set for particular tasks. The fail grade may be a result of insufficient preparation, of inattention to assignment guidelines or lack of academic ability. A frequent cause of failure is lack of attention to subject or assignment guidelines. |
Quality assurance
For the purposes of quality assurance, Bond University conducts an evaluation process to measure and document student assessment as evidence of the extent to which program and subject learning outcomes are achieved. Some examples of student work will be retained for potential research and quality auditing purposes only. Any student work used will be treated confidentially and no student grades will be affected.
Study Information
Submission procedures
Students must check the iLearn@Bond subject site for detailed assessment information and submission procedures.
Policy on late submission and extensions
A late penalty will be applied to all overdue assessment tasks unless an extension is granted by the subject coordinator. The standard penalty will be 10% of marks awarded to that assessment per day late with no assessment to be accepted seven days after the due date. Where a student is granted an extension, the penalty of 10% per day late starts from the new due date.
Academic Integrity
University’s Academic Integrity Policy defines plagiarism as the act of misrepresenting as one’s own original work: another’s ideas, interpretations, words, or creative works; and/or one’s own previous ideas, interpretations, words, or creative work without acknowledging that it was used previously (i.e., self-plagiarism). The University considers the act of plagiarising to be a breach of the Student Conduct Code and, therefore, subject to the Discipline Regulations which provide for a range of penalties including the reduction of marks or grades, fines and suspension from the University.
Bond University utilises Originality Reporting software to inform academic integrity.Feedback on assessment
Feedback on assessment will be provided to students within two weeks of the assessment submission due date, as per the Assessment Policy.
Accessibility and Inclusion Support
If you have a disability, illness, injury or health condition that impacts your capacity to complete studies, exams or assessment tasks, it is important you let us know your special requirements, early in the semester. Students will need to make an application for support and submit it with recent, comprehensive documentation at an appointment with a Disability Officer. Students with a disability are encouraged to contact the Disability Office at the earliest possible time, to meet staff and learn about the services available to meet your specific needs. Please note that late notification or failure to disclose your disability can be to your disadvantage as the University cannot guarantee support under such circumstances.
Additional subject information
Subject curriculum
-
Introduction and Overview
Students are introduced to basic concepts, structure of the subject and expectations of learning outcomes.
SLOs included
- Have knowledge of how digital technologies are effecting international relations
-
Traditional to Cyber Security
Security is defined within the changing challenges to state and society.
SLOs included
- Have knowledge of how digital technologies are effecting international relations
- Have an ability to assess the digital technology security risks to individuals, firms and states
-
Networks and Technology
What is a network and who are the hackers is outlined.
SLOs included
- Have knowledge of how digital technologies are effecting international relations
- Have an understanding of how networks operate
- Have an ability to assess the digital technology security risks to individuals, firms and states
-
Hacking and Hackers
How is hacking undertaken and by who.
SLOs included
- Have an understanding of how networks operate
- Have an ability to assess the digital technology security risks to individuals, firms and states
-
Digital Piracy and Malware
Property ownership is almost impossible to ensure in a networked digital world where security solutions are readily overcome by programs.
SLOs included
- Have knowledge of how hacking is being achieved and how it may be restricted
- Have gained the ability to contribute to the deliberation of internet technology and policy
-
Economic Crime and Online Fraud
The global scope and increasing complexity of the internet enable crime and fraud. What is the role of state and regulation.
SLOs included
- Have an ability to assess the digital technology security risks to individuals, firms and states
- Have the capacity to mediate between technologists, administrators and government
-
Program Event
International Relations students attend a Networking, Masterclass and Industry Consultation.
SLOs included
- Have the capacity to mediate between technologists, administrators and government
-
Exploiting the Darknet
What is the Darknet and how and why is it employed.
SLOs included
- Have knowledge of how digital technologies are effecting international relations
- Have knowledge of how hacking is being achieved and how it may be restricted
- Have an understanding of how networks operate
-
IR and the Digital Age
The relations between states has been radically altered by the digital age.
SLOs included
- Have knowledge of how digital technologies are effecting international relations
- Have gained the ability to contribute to the deliberation of internet technology and policy
- Have the capacity to mediate between technologists, administrators and government
-
Cyber Warfare, Terror and Espionage
States are the most advanced users of networks. Why and how are they pursuing power and who/what are the adversaries.
SLOs included
- Have knowledge of how digital technologies are effecting international relations
- Have the capacity to mediate between technologists, administrators and government
-
Secret Diplomacy to Hacktivism
Wikileaks is the most known political hacking platform. Who and why are individuals undermining traditional state diplomacy.
SLOs included
- Have knowledge of how digital technologies are effecting international relations
- Have the capacity to mediate between technologists, administrators and government
-
Attribution and Deterrence
How should states individually and collectively regulate networks for improved security.
SLOs included
- Have gained the ability to contribute to the deliberation of internet technology and policy
- Have the capacity to mediate between technologists, administrators and government