Upload
doanthuy
View
212
Download
0
Embed Size (px)
Citation preview
CRICOS 00111D, TOID 3069
Cracking the code on an IT careerJade Khoo
Patrick Hosseini & Laura DeansJames Hamlyn-Harris
3
95% of web attacks are financially motivated
The Australian government department
has reported that the average cost of cybercrime
attack to a business is around $276,000
Identity fraud up by 57% as thieves ‘hunt’
on social media’
Hacks that leave you exposed
Nearly 30% of people open
phishing emails, 12% do click the
link or open attached files
Hacker steals 45 million accounts from hundreds of car, tech, sports
forums
In WWII we bombed anddestroyed the electrical
infrastructure of ourenemies. Now we havethe ability, through a
cyberattack, to just shutthe grid down.As we share more of
our lives online,we open ourselves to
being exploited
Siri is always listening
93% of cases hackers took just minutes to breach, while companies tookweeks or months to
discover
March 2016 – Facebook vulnerabilityhttp://www.anandpraka.sh/2016/03/how-i-could-have-hacked-your-facebook.html
Bug bounties and ethical hackingOrganisations set up bug bounty programs to reward hackers who find security flaws in their products– Security researcher Aanand Prakash was paid $15,000 USD for finding
the aforementioned Facebook exploit
Rewards skilled hackers and helps further secure applications
Professional hackers employed to audit Information Security at your worksite are called Penetration Testers
Hacking is the bypassing of systemsSocial engineering– Gaining physical access by manipulating human behaviour– From being polite to dumpster diving– Trust is exploitable– Acquiring physical access to a system is the best possible
result for a malicious person
Password policiesWriting down passwords on sticky notes or in notebooks
Storing said sticky notes and notebooks nearby in a desk –maybe the lower one so that its not totally obvious
Passwords vs Passphrases
What is a ‘capture the flag’ challenge?Public competitions where people perform hacking techniques to reveal ‘flags’ to submit and score points for their team
Vary in difficulty
Designed to train and test various skills used in penetration testing
Free CTF challenges provide a good way for students to self-teach
Information Technology courses
13
Bachelor of Information and Communication Technology
Majors:Business Systems
Network Technology
Systems Analysis
Systems Management
Software Technology
Bachelor of Computer Science (Professional)Bachelor of Computer Science
Majors: Cybersecurity
Network Design
Internet of Things
Data Science
Software Design
Software Development
Games Development
Double degrees:
Bachelor of Engineering (Honours)Bachelor of Games and InteractivityBachelor of Laws
Entry requirements
14
Course Expected 2018 ATAR
Bachelor of Computer Science (Professional) 80+Bachelor of Computer Science 70+Bachelor of Information and Communication Technologies 60+Diploma of Information Technology (UniLink) – (pathway into second year) 50+
VCE prerequisites: Units 3 and 4: a minimum study score of 25 in English (or equivalent) or 30 in English (EAL); and Units 1 and 2: satisfactory completion in two units (any study combination) of any Mathematics.
Vocational education/TAFE qualifications
Entry requirementsEntry into this program is based on an applicant’s study and/or relevant work history. Some additional criteria may also apply.
CoursesAdvanced Diploma of Computer Systems Technology Diploma of Software Development Diploma in Information Technology NetworkingCertificate IV in Information Technology NetworkingCertificate IV in Computer Systems Technology Certificate IV in Information Technology
Where are our graduates working?
16