General Information
This subject introduces you to the international relations of digital technologies and develops fundamental knowledge of how networks operate. State and nonstate actors have rapidly acquired the capacity to pursue power and disrupt adversaries through the cyber world. The subject provides you with the theoretical and practical skills to explore the infrastructure and processes of networks and how, why and where hacking is being employed. You will examine individual, firm and state security within this changed international environment of identity and credit card theft, malware, viruses, botnets, cyberespionage, cyber-attacks and denial of service. Hacking, Networks and Security considers global cyber governance structures and standards as well as states’ attempts to balance technological benefits against emergent threats, through policy on the issues studied in the subject such as cyber war, data security, cloud computing, surveillance or government censorship.
-
Details
Academic unit: Faculty of Society & Design Subject code: INTR11-102 Subject title: Hacking, Networks and Security Subject level: Undergraduate Semester/Year: September 2024 Credit points: 10.000 -
Delivery & attendance
Timetable: https://bond.edu.au/timetable Delivery mode: Standard Workload items: - Forum: x12 (Total hours: 24) - Weekly Forum
- Tutorial: x12 (Total hours: 12) - Weekly Tutorial
- Personal Study Hours: x12 (Total hours: 84) - Recommended Study Hours
Attendance and learning activities: As successful completion of this subject is heavily dependent on participation during all scheduled sessions, attendance will be monitored. Most sessions build on the content of the previous one. It is difficult for a student to recover the information if a session is missed. It is the responsibility of the student to view the recordings of the weekly live sessions in order to catch up on any content missed and to complete set work outside class. In addition to synchronous sessions, students should plan to spend a minimum of 84 hours undertaking preparation/out of class work/personal study for this subject. This is intended as a general guide only for workload planning and more time may be required depending on factors such as the familiarity of the content. Please note: If you study on-campus, always bring your laptop to class. When you participate in the online sessions, always choose a private quiet place, with reliable internet and working microphone and camera, as you will use them regularly for class participation and activities. -
Resources
Prescribed resources: No Prescribed resources.
After enrolment, students can check the Books and Tools area in iLearn for the full Resource List.iLearn@Bond & Email: iLearn@Bond is the Learning Management System at Bond University and is used to provide access to subject materials, class recordings and detailed subject information regarding the subject curriculum, assessment, and timing. Both iLearn and the Student Email facility are used to provide important subject notifications.
Additionally, official correspondence from the University will be forwarded to students’ Bond email account and must be monitored by the student.
To access these services, log on to the Student Portal from the Bond University website as www.bond.edu.au
Academic unit: | Faculty of Society & Design |
---|---|
Subject code: | INTR11-102 |
Subject title: | Hacking, Networks and Security |
Subject level: | Undergraduate |
Semester/Year: | September 2024 |
Credit points: | 10.000 |
Timetable: | https://bond.edu.au/timetable |
---|---|
Delivery mode: | Standard |
Workload items: |
|
Attendance and learning activities: | As successful completion of this subject is heavily dependent on participation during all scheduled sessions, attendance will be monitored. Most sessions build on the content of the previous one. It is difficult for a student to recover the information if a session is missed. It is the responsibility of the student to view the recordings of the weekly live sessions in order to catch up on any content missed and to complete set work outside class. In addition to synchronous sessions, students should plan to spend a minimum of 84 hours undertaking preparation/out of class work/personal study for this subject. This is intended as a general guide only for workload planning and more time may be required depending on factors such as the familiarity of the content. Please note: If you study on-campus, always bring your laptop to class. When you participate in the online sessions, always choose a private quiet place, with reliable internet and working microphone and camera, as you will use them regularly for class participation and activities. |
Prescribed resources: | No Prescribed resources. After enrolment, students can check the Books and Tools area in iLearn for the full Resource List. |
---|---|
iLearn@Bond & Email: | iLearn@Bond is the Learning Management System at Bond University and is used to provide access to subject materials, class recordings and detailed subject information regarding the subject curriculum, assessment, and timing. Both iLearn and the Student Email facility are used to provide important subject notifications. Additionally, official correspondence from the University will be forwarded to students’ Bond email account and must be monitored by the student. To access these services, log on to the Student Portal from the Bond University website as www.bond.edu.au |
Enrolment requirements
Requisites: |
Nil |
---|---|
Assumed knowledge: |
Assumed knowledge is the minimum level of knowledge of a subject area that students are assumed to have acquired through previous study. It is the responsibility of students to ensure they meet the assumed knowledge expectations of the subject. Students who do not possess this prior knowledge are strongly recommended against enrolling and do so at their own risk. No concessions will be made for students’ lack of prior knowledge.
|
Restrictions: |
Nil |
Assurance of learning
Assurance of Learning means that universities take responsibility for creating, monitoring and updating curriculum, teaching and assessment so that students graduate with the knowledge, skills and attributes they need for employability and/or further study.
At Bond University, we carefully develop subject and program outcomes to ensure that student learning in each subject contributes to the whole student experience. Students are encouraged to carefully read and consider subject and program outcomes as combined elements.
Program Learning Outcomes (PLOs)
Program Learning Outcomes provide a broad and measurable set of standards that incorporate a range of knowledge and skills that will be achieved on completion of the program. If you are undertaking this subject as part of a degree program, you should refer to the relevant degree program outcomes and graduate attributes as they relate to this subject.
Subject Learning Outcomes (SLOs)
On successful completion of this subject the learner will be able to:
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Independently and in teams, generate and transmit solutions to unpredictable and sometimes complex problems related to Hacking, Networks and Security.
- Apply disciplinary knowledge and skills to professional work and/or further learning, demonstrating well-developed judgement and responsibility.
Generative Artificial Intelligence in Assessment
The University acknowledges that Generative Artificial Intelligence (Gen-AI) tools are an important facet of contemporary life. Their use in assessment is considered in line with students’ development of the skills and knowledge which demonstrate learning outcomes and underpin study and career success. Instructions on the use of Gen-AI are given for each assessment task; it is your responsibility to adhere to these instructions.
-
Assessment details
Type Task % Timing* Outcomes assessed Project Report Research Project: Presentation and Report on topics related to the subject: 1.Seminar/Webinar (15 min) and 2.1000-word Report (due 1 week after the seminar). Topics assigned in week 1; seminars starting from week 2. 70.00% To Be Negotiated 1,2,3 Project Make a video on Hacking, Networks and Security, aimed at the employees of government departments. Length: 2 min. Include basic definitions, methods, content and common errors to avoid. Submit the video 1 week after the Report. 30.00% To Be Negotiated 1,2,3 - * Assessment timing is indicative of the week that the assessment is due or begins (where conducted over multiple weeks), and is based on the standard University academic calendar
- C = Students must reach a level of competency to successfully complete this assessment.
-
Assessment criteria
Assessment criteria
High Distinction 85-100 Outstanding or exemplary performance in the following areas: interpretative ability; intellectual initiative in response to questions; mastery of the skills required by the subject, general levels of knowledge and analytic ability or clear thinking. Distinction 75-84 Usually awarded to students whose performance goes well beyond the minimum requirements set for tasks required in assessment, and who perform well in most of the above areas. Credit 65-74 Usually awarded to students whose performance is considered to go beyond the minimum requirements for work set for assessment. Assessable work is typically characterised by a strong performance in some of the capacities listed above. Pass 50-64 Usually awarded to students whose performance meets the requirements set for work provided for assessment. Fail 0-49 Usually awarded to students whose performance is not considered to meet the minimum requirements set for particular tasks. The fail grade may be a result of insufficient preparation, of inattention to assignment guidelines or lack of academic ability. A frequent cause of failure is lack of attention to subject or assignment guidelines. Quality assurance
For the purposes of quality assurance, Bond University conducts an evaluation process to measure and document student assessment as evidence of the extent to which program and subject learning outcomes are achieved. Some examples of student work will be retained for potential research and quality auditing purposes only. Any student work used will be treated confidentially and no student grades will be affected.
Type | Task | % | Timing* | Outcomes assessed |
---|---|---|---|---|
Project Report | Research Project: Presentation and Report on topics related to the subject: 1.Seminar/Webinar (15 min) and 2.1000-word Report (due 1 week after the seminar). Topics assigned in week 1; seminars starting from week 2. | 70.00% | To Be Negotiated | 1,2,3 |
Project | Make a video on Hacking, Networks and Security, aimed at the employees of government departments. Length: 2 min. Include basic definitions, methods, content and common errors to avoid. Submit the video 1 week after the Report. | 30.00% | To Be Negotiated | 1,2,3 |
- * Assessment timing is indicative of the week that the assessment is due or begins (where conducted over multiple weeks), and is based on the standard University academic calendar
- C = Students must reach a level of competency to successfully complete this assessment.
Assessment criteria
High Distinction | 85-100 | Outstanding or exemplary performance in the following areas: interpretative ability; intellectual initiative in response to questions; mastery of the skills required by the subject, general levels of knowledge and analytic ability or clear thinking. |
---|---|---|
Distinction | 75-84 | Usually awarded to students whose performance goes well beyond the minimum requirements set for tasks required in assessment, and who perform well in most of the above areas. |
Credit | 65-74 | Usually awarded to students whose performance is considered to go beyond the minimum requirements for work set for assessment. Assessable work is typically characterised by a strong performance in some of the capacities listed above. |
Pass | 50-64 | Usually awarded to students whose performance meets the requirements set for work provided for assessment. |
Fail | 0-49 | Usually awarded to students whose performance is not considered to meet the minimum requirements set for particular tasks. The fail grade may be a result of insufficient preparation, of inattention to assignment guidelines or lack of academic ability. A frequent cause of failure is lack of attention to subject or assignment guidelines. |
Quality assurance
For the purposes of quality assurance, Bond University conducts an evaluation process to measure and document student assessment as evidence of the extent to which program and subject learning outcomes are achieved. Some examples of student work will be retained for potential research and quality auditing purposes only. Any student work used will be treated confidentially and no student grades will be affected.
Study Information
Submission procedures
Students must check the iLearn@Bond subject site for detailed assessment information and submission procedures.
Policy on late submission and extensions
A student who has not established a basis for an extension in compliance with University and Faculty policy either by 1) not applying before the assessment due date or 2) by having an application rejected due to failure to show a justifiable cause for an extension, will receive a penalty on assessment submitted after its due date. The penalty will be 10% of marks awarded to that assessment for every day late, with the first day counted after the required submission time has passed. No assessment will be accepted for consideration seven calendar days after the due date. Where a student has been granted an extension, the late penalty starts from the new due date and time set out in the extension.
Academic Integrity
Bond University‘s Student Code of Conduct Policy , Student Charter, Academic Integrity Policy and our Graduate Attributes guide expectations regarding student behaviour, their rights and responsibilities. Information on these topics can be found on our Academic Integrity webpage recognising that academic integrity involves demonstrating the principles of integrity (honesty, fairness, trust, professionalism, courage, responsibility, and respect) in words and actions across all aspects of academic endeavour.
Staff are required to report suspected misconduct. This includes all types of plagiarism, cheating, collusion, fabrication or falsification of data/content or other misconduct relating to assessment such as the falsification of medical certificates for assessment extensions. The longer term personal, social and financial consequences of misconduct can be severe, so please ask for help if you are unsure.
If your work is subject to an inquiry, you will be given an opportunity to respond and appropriate support will be provided. Academic work under inquiry will not be marked until the process has concluded. Penalties for misconduct include a warning, reduced grade, a requirement to repeat the assessment, suspension or expulsion from the University.
Feedback on assessment
Feedback on assessment will be provided to students according to the requirements of the Assessment Procedure Schedule A - Assessment Communication Procedure.
Whilst in most cases feedback should be provided within two weeks of the assessment submission due date, the Procedure should be checked if the assessment is linked to others or if the subject is a non-standard (e.g., intensive) subject.
Accessibility and Inclusion Support
Support is available to students where a physical, mental or neurological condition exists that would impact the student’s capacity to complete studies, exams or assessment tasks. For effective support, special requirement needs should be arranged with the University in advance of or at the start of each semester, or, for acute conditions, as soon as practicable after the condition arises. Reasonable adjustments are not guaranteed where applications are submitted late in the semester (for example, when lodged just prior to critical assessment and examination dates).
As outlined in the Accessibility and Inclusion Policy, to qualify for support, students must meet certain criteria. Students are also required to meet with the Accessibility and Inclusion Advisor who will ensure that reasonable adjustments are afforded to qualifying students.
For more information and to apply online, visit BondAbility.
Additional subject information
Subject curriculum
-
Introduction - Concepts and careers
Students are introduced to the concepts, structure of the subject and expectations of learning outcomes.
SLOs included
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Apply disciplinary knowledge and skills to professional work and/or further learning, demonstrating well-developed judgement and responsibility.
-
Security - Ideologies and theories
Security is defined within the changing challenges to state and society. Traditional versus contemporary, liberal, realist, critical theory, hacking and networks.
SLOs included
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Independently and in teams, generate and transmit solutions to unpredictable and sometimes complex problems related to Hacking, Networks and Security.
-
Intelligence - A working concept
What is intelligence? Why have intelligence agencies?
SLOs included
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Independently and in teams, generate and transmit solutions to unpredictable and sometimes complex problems related to Hacking, Networks and Security.
-
Espionage and Counterintelligence
The anatomy of intelligence is explored giving meaning and purpose.
SLOs included
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Independently and in teams, generate and transmit solutions to unpredictable and sometimes complex problems related to Hacking, Networks and Security.
-
Political Warfare - The Vanguard Party
The global scope and increasing complexity of the internet enables increased political warfare. What is the role of state, regulation of information and disinformation?
SLOs included
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Independently and in teams, generate and transmit solutions to unpredictable and sometimes complex problems related to Hacking, Networks and Security.
-
Scientific Warfare - Huawei and 5G
Speculation of Cold War 2 includes the division of the global system into technological spheres of information and technology.
SLOs included
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Independently and in teams, generate and transmit solutions to unpredictable and sometimes complex problems related to Hacking, Networks and Security.
-
Cyber Warfare, Espionage and Terror
State are the most advanced users of networks. Why and how are they pursuing power and who/what are the adversaries.
SLOs included
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Independently and in teams, generate and transmit solutions to unpredictable and sometimes complex problems related to Hacking, Networks and Security.
- Apply disciplinary knowledge and skills to professional work and/or further learning, demonstrating well-developed judgement and responsibility.
-
Bond IT Incursion - Case Study
Meet with IT professionals and gain an understanding of the working environment.
SLOs included
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Apply disciplinary knowledge and skills to professional work and/or further learning, demonstrating well-developed judgement and responsibility.
-
Five Eyes, intelligence services and how they support states' security
The intelligence community, how it interacts within and between states.
SLOs included
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Independently and in teams, generate and transmit solutions to unpredictable and sometimes complex problems related to Hacking, Networks and Security.
-
Tradecraft
Historical examples, present perspectives and the future of tradecraft.
SLOs included
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Independently and in teams, generate and transmit solutions to unpredictable and sometimes complex problems related to Hacking, Networks and Security.
- Apply disciplinary knowledge and skills to professional work and/or further learning, demonstrating well-developed judgement and responsibility.
-
Human Intelligence - Exercise
The art of intelligence.
SLOs included
- Independently and in teams, generate and transmit solutions to unpredictable and sometimes complex problems related to Hacking, Networks and Security.
- Apply disciplinary knowledge and skills to professional work and/or further learning, demonstrating well-developed judgement and responsibility.
-
Conclusion - Adapt, Trade and Vote
Hacking, networks and security within the broad systemic context of the Post-pandemic.
SLOs included
- Identify, analyse, evaluate and communicate broad and coherent theoretical and technical knowledge in the study of Hacking, Networks and Security.
- Independently and in teams, generate and transmit solutions to unpredictable and sometimes complex problems related to Hacking, Networks and Security.
- Apply disciplinary knowledge and skills to professional work and/or further learning, demonstrating well-developed judgement and responsibility.