[Monash Home][Monash Info][News and Events][Campuses and Faculties] [Monash University]
SiMS Home
SiMS HomeAbout UsCourses & SubjectsStaffResearchContact
SiMS Home
 
Handbook   Overview   Lectures   Tutorials   Readings   Assessment   Staff

IMS5002 - Information System Security

Prescribed resources:

As this is a dynamic subject, there are no prescribed resources. I prefer students to obtain, and have access to a variety of different resources.

Recommended resources:

Allinson, Caroline (2002). Information Systems Audit Trails; An Australian Government survey. Journal of Research and Practice in Information Technology , Vol 34, No 1. pp 47-64.

Bosworth, S. & Kabay , M.E. (eds). (2002). Computer Security Handbook. Canada John Wiley & Sons.

Anderson, R. (2001). Security Engineering. London : John Wiley & Sons.

Merkow, M.S. & Breithaupt, J. (2000). The Complete Guide to Internet

Security. New York : American Management Association (Amacom). (This text is on electronic copy in the library. Use your authcate access code .)

On Reserve (Caulfield Library only) :

Students are reminded that books “on reserve” can be obtained from the library counter. Students have access to these books for two hour time slots. You may photocopy articles and resources as required.

Ciampa, M. (2005). Security+ Guide to Network Security Fundamentals, (2 nd Edn). Boston , Massachusetts : Thomson Technology.

Erbschloe, M. (2003). Guide to Disaster Recovery. Boston , Massachusetts : Thomson Technology.

Maiwald, E. (2004). Fundamentals of Network Security. New York : McGraw-Hill.

Palmer, M. (2004). Guide to Operating Systems Security. Boston , Massachusetts : Thomson Technology .

Panko, R. R. (2004). Corporate Computer and Network Security. New Jersey : Pearson Education International.

Quirk, P. & Forder, J. (2003). Electronic Commerce and the Law (2 nd Edn). Singapore : John Wiley & Sons Australia, Ltd.

Whiteman, M. E. & Mattord, H. J. (2005). Principles of Information Security (2 nd Edn). Boston , Massachusetts : Thomson Technology.

Additional references:

Dhillon, G. & Backhouse, J. (2 001). "Current directions in IS security research: towards socio-organizational perspectives", Information Systems Journal, Vol 11, 127-153.

Grant, G.L. 1998. Understanding Digital Signatures: Establishing Trust over the Internet and other Networks. McGraw-Hill.

Krause, M. & Tipton, H.F. (eds) (1999). Handbook of Information Security and Management.

Lu dlow , P. (ed) ( 2001). Crypto Anarchy, Cyberstates, and Pirate Utopias. The MIT Press.

Meinel, C. ( 2001). "Code Red: worm assault on the Web", Scientific American, September.

Moon, P. ( 1999). “Everything you always wanted to know about digital signatures”, NSW Law Society Journal, Vol 37 No 4, p57.

Rosen, J. ( 2001). "Out of context: the purposes of privacy", Social Research, Vol 68 No 1, 209-220.

Rosenheim , S.J. ( 1997). The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet. Baltimore : John Hopkins University Press .

Singh, S. ( 1999). The Code Book: the Secret History of Codes & Code-breaking. London : Fourth Estate.

Straub, D.W. & Welke, R.J. ( 1998). "Coping with systems risk: security planning models for management decision making", MIS Quarterly, Vol 22, 441-470.

Stoll, C. (1990). The Cuckoo's Egg. New York : Pocket Books.

Thomas, D. & Loader, B.D. 2000. Cybercrime: law enforcement, security and surveillance in the information age. Routledge.

The Honeynet Project. ( 2002). Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Boston : Addison-Wesley.

Important Web sites :

The SANS top trends in security management for 2002: White paper, January 2002 ( www.netiq.com )

www.CSOonline.com.au

http://www.cert.org/

http://www.cert.org/archive/html/protect-critical-systems.html#abs

Presentations and reports: Attack and intruder trends

http://www.cert.org/nav/index_red.html

http://www.cert.org/incident_notes/IN-2003-01.html

Independent Commission Against Corruption. eCorruption: eCrime vulnerabilities in the NSW Public Sector, Summary Report, 2001.

http://www.thinkmobile.com/News/00/48/29/

Disaster Strategies for Record Keeping:

www.records.nsw.gov.au/publicsector/rk/guidelines/counterdisaster/Introduction.htm

http://www.treasury.gov.au

www.privacy.gov.au/publications/pia1_print.html

Developing a security policy, December 2001, SunBluePrints http://www.sun.com/blueprints

PLEASE LOOK AT THE FOLLOWING:

During month of April, SANS will present weekly webcasts you won't want to miss. Join us for our First Wednesday Webcast on April 6, 2005, "Best Practices for Winning the War Against Viruses and Spam". If you've never tuned in to a SANS webcast before, see the simple instructions at the end of this message to learn how to connect to the SANS Portal and join us for these free educational webcasts. Remember that times are Eastern Daylight Time (Daylight Savings Time began April 3, 2005)! ************************************************************************ Best Practices for Winning the War Against Viruses and Spam Wednesday, April 06 at 1:00 PM EDT (1700 UTC) https://www.sans.org/webcasts/show.php?webcastid=90564 Featuring: Jeff Brainard Sponsored by: Mirapoint The enemy is out there, inundating your inbox with spam, viruses and hacking your systems to make managing your email infrastructure a constant nightmare. When it comes to email security almost doesn't cut it. Join this webcast and learn how to protect your IT infrastructure from various email threats. The speaker, Jeff Brainard, is Director of Corporate & Product Marketing at Mirapoint and is an industry expert on the application of email, as well as email-specific hygiene. ************************************************************************* Upcoming Webcasts include: Internet Storm Center: Threat Update Wednesday, April 13, at 2:00 p.m. EDT (1800 UTC) https://www.sans.org/webcasts/show.php?webcastid=90545 Featuring: Johannes Ullrich and Andy Wrightman Sponsored by: Network Appliance, Inc. This monthly webcast discusses recent threats observed by the Internet Storm Center, and discusses new software vulnerabilities or system exposures that were disclosed over the past month. Spyware Featuring: Andy Wrightman This talk will address the surge of spyware variations--the symptoms and some of the common tricks deployed. ************************************************************************* Additional upcoming webcasts, including What Works Webcasts, may be found on http://www.sans.org/webcasts/ SANS live web broadcasts allow you to hear a knowledgeable speaker while viewing presentation slides you can download in advance. In order to access the webcasts, you will need a SANS portal account and either Real Audio Player or Windows Media Player (free downloads are available at our website). If you do not already have a portal account, just go to http://portal.sans.org and fill in the simple registration form, it's free! Your account gives you access to the archive of past webcasts. Log on to http://www.sans.org/webcasts/archive.php .

 
HelpContactsSite MapStaff DirectorySearch
Return to the Top of the PageMonash University ABN 12 377 614 012. Copyright © 1994-2001 Monash University - Caution - Privacy
SIMS is part of the Faculty of Information Technology -
Authorised by: Head of School. Maintained by: Sue Foster