Interaction design is concerned with a broader scope of issues, topics, and methods than human–computer interaction (HCI), with a focus on the diversity of design and evaluation processes involved. This course intends to enable students to
On completion of this course students should be able to
Textbook
Evaluation | Marks | Percentage |
---|---|---|
Progress/ Class Participation | 5 Marks | 5% |
Assignment + Discussion + Tutorial | 10 Marks | 10% |
Written Exam | 35 Marks | 35% |
In this course, students learn basics of information security. It is a study of the principles and practices of computer system security. Information Technology systems need to ensure the confidentiality, integrity, and availability of information. Topics include common attacking techniques such as virus, Trojan, worms and memory exploits; the formalisms of information security such as the access control and information flow theory; the common security policies such as BLP and Biba model; the basic cryptography, RSA, cryptographic hash function, and password system; the system testing with security testing tools. Students will also learn basics of application of cryptography which are one of the key technologies to implement security functions. At the last session, teams of students will make presentation of their study project for a topic related to information security.
This course aims to
Upon successful completion of this course, the student will have the ability to:
Textbooks
Evaluation | Marks | Percentage |
---|---|---|
Tutorial+ Assignment+ Demonstration | 10 Marks | 10% |
Class Participation | 5 Marks | 5% |
Final Examination | 35 Marks | 35% |