CYB306 – Trustworthy Systems
The unit will cover topics on the broader area of trustworthy computing systems. The first part of the unit will include an introduction to trustworthiness in the design-time flux, asymmetry analysis of cyberspace and its effects to trustworthy system design, trade-off for cybersecurity performance vs. functionality. The second part of the unit comprises trustworthy system strategies for risk management, information assurance fundamentals, cybersensors, exploitation tactics and holistic intelligence including cybersecurity command and control design (including command and control centres). The third part of the unit will comprise topics on architecting trustworthy cybersecurity, formal verification and protocol assurance for trustworthy systems, optimisation for cybersecurity (knapsack algorithm) and sensitivity analysis (including basics of probability).
Learning Outcomes:
- Examine fundamentals of trusted computing systems and related protocols
- Apply knowledge of cybersecurity to foster information assurance and to engineer cybersecurity for trustworthy systems
- Apply security analysis techniques for evaluating complex IT systems including formal protocol verification
- Identify and architect cyber security solutions and formally prove solution viability