BTN710 - Information Security

Outline information
Schools offering this subject
Last revision date Jul 31, 2018 9:29:05 AM
Last review date Jul 31, 2018 9:29:30 AM

Subject Title
Information Security

Subject Description
With the ever-expanding use of the internet there has been an increased need for security at all levels within data communications. This course provides the technical foundation required to understand the security concerns faced by network administrators, technical support staff and end users in today's data communications environments. Current security solutions that address issues such as Authentication and Authorization, Data Integrity, Non Repudiation, Privacy/Confidentiality, and Availability of Service will be examined through a combination of lectures and hands-on labs.

Credit Status
1 credit (3 units)
Required for BSD - Bachelor of Technology (Software Development)

Learning Outcomes
Upon successful completion of this subject the student will be able to:

  • explain the function of various security tools for systems adminisrators and program developers
  • document the methods used to distribute workload among group members
  • create diagrams that illustrate basic network security concepts
  • apply appropriate network and information security terminology in lab exercises
  • explain the basic principles of cryptography
  • list and explain several types of attacks that a network may be subject to
  • explain the importance of a security policy, as it pertains to intruder detection, viruses, and system backkups
  • discuss security as it applies to VPNs
  • explain cryptographic techniques including encryption, hashing, message authenticaion, PKI and digital signatures
  • discuss the operation of firewalls, and various tunneling protocols
  • explain networking security concepts to various audiences using appropriate terminology
  • document group decisions in selecting and researching a topic dealing with network security
  • explain email security applications such as PGP and S/MIME
  • discuss network security and security standards as they apply to the Internet
  • explain various authentication systems
  • explain web security applications such as SSL and SET
  • explain basic network security concepts
  • synthesize the results of the group member's efforts into a final product
  • conduct guided research into selected areas of network security, using both Internet and print sources
  • explain various methods used to secure enterprise data networks that are connected to Public Data Networks
  • explain the importance of risk analysis and assessment in the Information Security Life Cycle

Essential Employability Skills
Communicate clearly, concisely and correctly in the written, spoken and visual form that fulfils the purpose and meets the needs of the audience.

Respond to written, spoken, or visual messages in a manner that ensures effective communication.

Execute mathematical operations accurately.

Apply a systematic approach to solve problems.

Locate, select, organize, and document information using appropriate technology and information systems.

Analyze, evaluate, and apply relevant information from a variety of sources.

Interact with others in groups or teams in ways that contribute to effective working relationships and the achievement of goals.

Manage the use of time and other resources to complete projects.

Take responsibility for one's own actions, decisions, and consequences.

Academic Integrity
Seneca upholds a learning community that values academic integrity, honesty, fairness, trust, respect, responsibility and courage. These values enhance Seneca's commitment to deliver high-quality education and teaching excellence, while supporting a positive learning environment. Ensure that you are aware of Seneca's Academic Integrity Policy which can be found at: Review section 2 of the policy for details regarding approaches to supporting integrity. Section 2.3 and Appendix B of the policy describe various sanctions that can be applied, if there is suspected academic misconduct (e.g., contract cheating, cheating, falsification, impersonation or plagiarism).

Please visit the Academic Integrity website to understand and learn more about how to prepare and submit work so that it supports academic integrity, and to avoid academic misconduct.

All students and employees have the right to study and work in an environment that is free from discrimination and/or harassment. Language or activities that defeat this objective violate the College Policy on Discrimination/Harassment and shall not be tolerated. Information and assistance are available from the Student Conduct Office at

Accommodation for Students with Disabilities
The College will provide reasonable accommodation to students with disabilities in order to promote academic success. If you require accommodation, contact the Counselling and Accessibility Services Office at ext. 22900 to initiate the process for documenting, assessing and implementing your individual accommodation needs.