IFQ583 Computer Systems and Security


To view more information for this unit, select Unit Outline from the list below. Please note the teaching period for which the Unit Outline is relevant.


Unit Outline: Session 1 2026, QUT Online, Online

Unit code:IFQ583
Credit points:12
Equivalent:IFN583 or ((IFN551 and IFN553) or (IFQ551and IFQ553))
Assumed Knowledge:

Nil

Disclaimer - Offer of some units is subject to viability, and information in these Unit Outlines is subject to change prior to commencement of the teaching period.

Overview

This unit addresses the core concepts of a computer system: how modern computer systems work, how they are structured, and how they operate. Additionally, the unit teaches you about modern computer environments including networks as well as introducing the fundamental concepts of cyber security in the context of computer systems. In particular, you will learn about controls and countermeasures to mitigate identified security risks, considering the threats, vulnerabilities and security goals of an organization. Understanding the fundamental concepts enables you to adapt with the evolution of computer systems in the future.

Learning Outcomes

On successful completion of this unit you will be able to:

  1. Explain the principles and major developments in computer systems, including hardware and software and the processes for information exchange between devices over a network
  2. Design, build and configure simple computer systems and networks
  3. Define major information security goals and identify those which relate to the strategic goals of an organisation.
  4. Conduct a risk analysis of the security of information assets in a range of practical situations and determine the information security implications.
  5. Choose controls and countermeasures to mitigate identified security risks, considering the threats, vulnerabilities and security goals of an organisation

Content

  • History and recent developments of computer systems
  • Basic number system concepts; in particular binary, hexadecimal, ASCII and Unicode representations
  • Components of computer systems, including software, hardware and data in various formats, and connections between devices
  • Fundamental cyber security concepts; including confidentiality, integrity, availability, authentication, authorization, nonrepudiation
  • Threats to the security of information in electronic computer systems, and vulnerabilities that can be exploited in cyber systems resulting in cyber security incidents (including attacks)
  • Methods (technical and non-technical) for protecting information assets; including identity management, access control, use of cryptography and network communications security.

Learning Approaches

This unit is designed for asynchronous online study. It uses a blend of on-line resources, online practical exercises and your own practice. The core material will be introduced in the text modules but will be supplemented by online video and code examples. Each week you will complete small programming exercises so that you can get rapid weekly feedback regarding your progress. Programming assignments will allow you the opportunity to apply and demonstrate your skills developing a more substantial software solution for a real-world problem. In this unit you will also have the opportunity to participate in online discussions with peers and teaching staff.

You are responsible for your academic progression through this unit. Unit staff will provide a learning environment designed to maximize your learning experience. In order to realize your full potential, it is strongly recommended that you actively participate in all of the learning activities offered in this unit. You should expect to spend on average, 15 hours per week, preparing and completing assessment tasks as well as in independent study to consolidate your learning. You must be able to manage your time and prioritize activities in order to complete the required unit activities. You are expected to complete all pre-tutorial activities before attending your collaborative sessions to maximize your learning.

Feedback on Learning and Assessment

Feedback in this unit is provided in the following ways:

  • You can ask the teaching staff for advice and assistance during collaborative sessions.
  • You will receive formative academic feedback on your practical exercises.
  • You will receive written feedback on submitted assessment items.

Assessment

Overview

This unit introduces foundational concepts and principles, so the assessment is based around the knowledge acquired throughout the semester. No prior knowledge is assumed. You will be assessed on the knowledge you have gained through assignment and an individual report.

Unit Grading Scheme

7- point scale

Assessment Tasks

Assessment: Computer Systems Implementation

This assessment item examines the development of a basic computer system.

The use of generative artificial intelligence (GenAI) tools is prohibited during this assessment.

This assignment is eligible for the 48-hour late submission period and assignment extensions.

 

Weight: 50
Length: 100 - 150 lines of text/code
Individual/Group: Individual
Due (indicative): Consolidation Week
Related Unit learning outcomes: 1, 2

Assessment: Security Report

This unit introduces foundational concepts and principles in computer systems and security.

This assessment item is based around security topics provided to students aligned with the security content of the unit.

The use of generative artificial intelligence (GenAI) tools is prohibited during this assessment.

This assignment is eligible for the 48-hour late submission period and assignment extensions

 

Weight: 50
Length: 2 pages
Individual/Group: Individual
Due (indicative): Week 8
Related Unit learning outcomes: 2, 3, 4, 5

Academic Integrity

Academic integrity is a commitment to undertaking academic work and assessment in a manner that is ethical, fair, honest, respectful and accountable.

The Academic Integrity Policy sets out the range of conduct that can be a failure to maintain the standards of academic integrity. This includes, cheating in exams, plagiarism, self-plagiarism, collusion and contract cheating. It also includes providing fraudulent or altered documentation in support of an academic concession application, for example an assignment extension or a deferred exam.

You are encouraged to make use of QUT’s learning support services, resources and tools to assure the academic integrity of your assessment. This includes the use of text matching software that may be available to assist with self-assessing your academic integrity as part of the assessment submission process.

Breaching QUT’s Academic Integrity Policy or engaging in conduct that may defeat or compromise the purpose of assessment can lead to a finding of student misconduct (Code of Conduct – Student) and result in the imposition of penalties under the Management of Student Misconduct Policy, ranging from a grade reduction to exclusion from QUT.

Resources

On line resource materials.

Risk Assessment Statement

There are no unusual health or safety risks associated with this unit.

Course Learning Outcomes

This unit is designed to support your development of the following course/study area learning outcomes.

IQ18 Graduate Certificate in Information Technology

  1. Demonstrate advanced knowledge of information technology disciplines.
    Relates to: ULO1, ULO3, Computer Systems Implementation, Security Report
  2. Critically analyse complex IT problems and opportunities and use creativity and problem-solving skills to generate solutions.
    Relates to: ULO3, ULO4, ULO5, Security Report
  3. Employ industry-best practice, IT methods, tools and techniques to develop and implement IT systems, processes and/or software.
    Relates to: ULO2, Computer Systems Implementation, Security Report

IQ19 Graduate Diploma in Information Technology

  1. Demonstrate advanced IT knowledge in one or more IT disciplines.
    Relates to: ULO1, ULO3, Computer Systems Implementation, Security Report
  2. Critically analyse complex IT problems and opportunities and use creativity and problem-solving skills to generate solutions.
    Relates to: ULO3, ULO4, ULO5, Security Report
  3. Apply advanced, industry-best practice, IT methods, tools and techniques to develop and implement IT systems, processes and/or software.
    Relates to: ULO2, Computer Systems Implementation, Security Report
  4. Demonstrate developed values, attitudes, behaviours and judgement in professional contexts.
    Relates to: Security Report

IQ20 Master of Information Technology

  1. Demonstrate advanced specialist IT knowledge in at least one information technology discipline
    Relates to: ULO1, ULO3, Computer Systems Implementation, Security Report
  2. Critically analyse complex IT problems and opportunities and use creativity and problem-solving skills to generate innovative and novel solutions that are convincingly justified.
    Relates to: ULO3, ULO4, ULO5, Security Report
  3. Integrate advanced, industry-best practice, IT methods, tools and techniques to develop and implement complex IT systems, processes and/or software.
    Relates to: ULO2, Computer Systems Implementation, Security Report
  4. Demonstrate business acumen and well-developed values, attitudes, behaviours and judgements in professional contexts.
    Relates to: ULO4, Security Report