Security and Privacy in the Information Age (信息化時代的安全與隱私)
3 - Science and Technology
No. of Credit Units
Medium of Instruction
Medium of Assessment
Related GE Programme Intended Learning Outcome
PILO 1:Demonstrate the capacity for self-directed learning
PILO 2:Explain the basic methodologies and techniques of inquiry of the arts and humanities, social sciences, business, and science and technology
PILO 3:Demonstrate critical thinking skills
PILO 4:Interpret information and numerical data
PILO 5:Produce structured, well-organised and fluent text
PILO 6:Demonstrate effective oral communication skills
PILO 7:Demonstrate an ability to work effectively in a team
PILO 9:Value ethical and socially responsible actions
PILO 10:Demonstrate the attitude and/or ability to accomplish discovery and/or innovation
Related Discovery-enriched Curriculum Aspect
Official Course Info.
This course aims to explain to students the potential and actual security threats and privacy issues that they may encounter when surfing the Internet or transacting online. Students will also learn countermeasure techniques as well as basic practice and software tools that they can use to enhance their security protection and ensure their privacy. The course also provides students with a basic understanding of the related legal, ethical, and societal issues of security and privacy in the information age. Interactive learning activities in the form of group discussions, project presentations, and problem sets form important parts of the course.
This course aims to expose students to the vast spectrum of potential and actual threats and vulnerabilities that surfing and transacting on the Internet may encounter. Students will also learn the basic countermeasure techniques. They will better understand some of the key technologies and tools in information security and infrastructure. In addition, the legal, ethical and societal issues will be dealt with. Students will be exposed to the rationales and debates behind the main privacy and electronic transaction ordinances. They will appreciate the balance between privacy protection and law enforcement, and will be in better position to utilize information technology in a secure, ethical and proper manner.
Course Material Highlight
CRN Section Semester Type Capacity Day Time Building Room Instructor 43469 43469C01 2015-16 Sem A Lecture 150 Thu 15:00-16:50 AMEN LT401 Dr. CHOW Chi Yin 43470 43470T01 2015-16 Sem A Tutorial 30 Tue 11:00-11:50 MMW 1411 Dr. CHOW Chi Yin 43471 43471T02 2015-16 Sem A Tutorial 30 Tue 10:00-10:50 MMW 1411 Dr. CHOW Chi Yin 43477 43477T03 2015-16 Sem A Tutorial 30 Tue 09:00-09:50 MMW 1411 Dr. CHOW Chi Yin 43480 43480T04 2015-16 Sem A Tutorial 30 Mon 10:00-10:50 MMW 1411 Dr. CHOW Chi Yin 43481 43481T05 2015-16 Sem A Tutorial 30 Mon 09:00-09:50 MMW 1411 Dr. CHOW Chi Yin 46061 46061C01 2015-16 Sem B Lecture 120 Sat 09:00-11:50 AC1 B2531 Dr. CAO Rui Lecture 120 Tue 13:00-14:50 AC1 LT-18 Dr. LEE Ka Chun Kenneth 46062 46062T01 2015-16 Sem B Tutorial 30 Fri 11:00-11:50 MMW 1411 Dr. LEE Ka Chun Kenneth 46064 46064T02 2015-16 Sem B Tutorial 30 Fri 10:00-10:50 MMW 1411 Dr. LEE Ka Chun Kenneth 46065 46065T03 2015-16 Sem B Tutorial 30 Thu 12:00-12:50 MMW 1411 Dr. LEE Ka Chun Kenneth 46066 46066T04 2015-16 Sem B Tutorial 30 Thu 11:00-11:50 MMW 1411 Dr. LEE Ka Chun KennethLast Updated Time: 06-May-2016 08:00