CYB306 – Trustworthy Systems

CYB306 – Trustworthy Systems

The unit will cover topics on the broader area of trustworthy computing systems. The first part of the unit will include an introduction to trustworthiness in the design-time flux, asymmetry analysis of cyberspace and its effects to trustworthy system design, trade-off for cybersecurity performance vs. functionality. The second part of the unit comprises trustworthy system strategies for risk management, information assurance fundamentals, cybersensors, exploitation tactics and holistic intelligence including cybersecurity command and control design (including command and control centres). The third part of the unit will comprise topics on architecting trustworthy cybersecurity, formal verification and protocol assurance for trustworthy systems, optimisation for cybersecurity (knapsack algorithm) and sensitivity analysis (including basics of probability).  

Learning Outcomes:

  • Examine fundamentals of trusted computing systems and related protocols
  • Apply knowledge of cybersecurity to foster information assurance and to engineer cybersecurity for trustworthy systems
  • Apply security analysis techniques for evaluating complex IT systems including formal protocol verification
  • Identify and architect cyber security solutions and formally prove solution viability

ACKNOWLEDGEMENT OF COUNTRY

We acknowledge the Traditional Custodians of the land on which we operate and we pay our respects to their Elders, past, present and emerging.

AAHE

Australasian Academy of Higher Education is an accredited Institute of Higher Education (ABN: 44 631 178 768; TEQSA Provider ID: PRV14361; CRICOS provider number: 04181B).

© COPYRIGHT 2024 POWERED BY AUSTRALASIAN ACADEMY OF HIGHER EDUCATION | ANOTHER WEBSITE BY ADVERTRON