Web
Analytics
Apply Now

FIT3173: Software security

6 points, SCA Band 2, 0.125 EFTSL

Undergraduate – Unit

Refer to the specific census and withdrawal datesfor the semester(s) in which this unit is offered.

Faculty

Information Technology

Offered

Clayton

  • First semester 2018 (On-campus)

South Africa

  • First semester 2018 (On-campus)

Prerequisites

One of FIT1045, FIT1048 or FIT1051 or equivalent

Synopsis

This unit aims to introduce secure software development issues from the design stage, through to implementation, testing and deployment. Topics studied include the secure software development life cycle, secure software design principles, threat evaluation models, secure coding and development practices, software security testing, deployment and maintenance. Students are provided with a range of practical exercises and tasks to reinforce their skills including: identification of security bugs in programs written in different programming languages, design, implementation, and testing of secure concurrent and networked applications and identification of vulnerabilities in networked and mobile/wireless applications.

Outcomes

At the completion of this unit, students should be able to:

  1. model the possible vulnerabilities and threats for a given application system;
  2. apply appropriate methods for the design and realisation of secure software;
  3. analyse and evaluate security properties of concurrent and networked applications.

Assessment

Examination (2 hours): 60%; In-semester assessment: 40%

Workload requirements

Minimum total expected workload equals 12 hours per week comprising:

  1. Contact hours for on-campus students:
    • Two hours lectures
    • Two hours laboratories
  2. Additional requirements (all students):
    • A minimum of 2-3 hours of personal study per one hour of lecture time in order to satisfy the reading, tute, prac and assignment expectations.

Chief examiner(s)

Associate Professor Carsten Rudolph

This unit applies to the following area(s) of study

Advanced computer science
Computer networks and security
Cybersecurity
Software development

We are currently offline, please enter your details below and we will get back to you as soon as possible!