Security and Privacy in the Information Age (信息化時代的安全與隱私)
3 - Science and Technology
No. of Credit Units
Medium of Instruction
Medium of Assessment
Related GE Programme Intended Learning Outcome
PILO 1:Demonstrate the capacity for self-directed learning
PILO 2:Explain the basic methodologies and techniques of inquiry of the arts and humanities, social sciences, business, and science and technology
PILO 3:Demonstrate critical thinking skills
PILO 4:Interpret information and numerical data
PILO 5:Produce structured, well-organised and fluent text
PILO 6:Demonstrate effective oral communication skills
PILO 7:Demonstrate an ability to work effectively in a team
PILO 9:Value ethical and socially responsible actions
PILO 10:Demonstrate the attitude and/or ability to accomplish discovery and/or innovation
Related Discovery-enriched Curriculum Aspect
Official Course Info.
This course aims to explain to students the potential and actual security threats and privacy issues that they may encounter when surfing the Internet or transacting online. Students will also learn countermeasure techniques as well as basic practice and software tools that they can use to enhance their security protection and ensure their privacy. The course also provides students with a basic understanding of the related legal, ethical, and societal issues of security and privacy in the information age. Interactive learning activities in the form of group discussions, project presentations, and problem sets form important parts of the course.
This course aims to expose students to the vast spectrum of potential and actual threats and vulnerabilities that surfing and transacting on the Internet may encounter. Students will also learn the basic countermeasure techniques. They will better understand some of the key technologies and tools in information security and infrastructure. In addition, the legal, ethical and societal issues will be dealt with. Students will be exposed to the rationales and debates behind the main privacy and electronic transaction ordinances. They will appreciate the balance between privacy protection and law enforcement, and will be in better position to utilize information technology in a secure, ethical and proper manner.
Course Material Highlight
CRN Section Semester Type Capacity Day Time Building Room Instructor 43469 43469C01 2014-15 Sem A Lecture 53 Thu 15:00-16:50 AC1 LT-2 Dr. CHOW Chi Yin 43470 43470T01 2014-15 Sem A Tutorial 9 Tue 11:00-11:50 MMW 1411 Dr. CHOW Chi Yin 43471 43471T02 2014-15 Sem A Tutorial 8 Tue 10:00-10:50 MMW 1411 Dr. CHOW Chi Yin 43477 43477T03 2014-15 Sem A Tutorial 8 Tue 09:00-09:50 MMW 1411 Dr. CHOW Chi Yin 43480 43480T04 2014-15 Sem A Tutorial 7 Tue 16:00-16:50 MMW 1411 Dr. CHOW Chi Yin 43481 43481T05 2014-15 Sem A Tutorial 7 Tue 15:00-15:50 MMW 1411 Dr. CHOW Chi Yin 43482 43482T06 2014-15 Sem A Tutorial 7 Tue 14:00-14:50 MMW 1411 Dr. CHOW Chi Yin 43483 43483T07 2014-15 Sem A Tutorial 7 Tue 13:00-13:50 MMW 1411 Dr. CHOW Chi Yin 35661 35661C01 2014-15 Sem B Lecture 150 Wed 12:00-13:50 AC1 LT-5 Dr. LEE Ka Chun Kenneth 35663 35663T01 2014-15 Sem B Tutorial 30 Tue 15:00-15:50 MMW 1411 Dr. LEE Ka Chun Kenneth 35664 35664T02 2014-15 Sem B Tutorial 30 Tue 14:00-14:50 MMW 1411 Dr. LEE Ka Chun Kenneth 35666 35666T03 2014-15 Sem B Tutorial 30 Tue 10:00-10:50 MMW 1411 Dr. LEE Ka Chun Kenneth 39074 39074T04 2014-15 Sem B Tutorial 30 Tue 09:00-09:50 MMW 1411 Dr. LEE Ka Chun Kenneth 44766 44766T05 2014-15 Sem B Tutorial 30 Tue 16:00-16:50 MMW 1406 Dr. LEE Ka Chun KennethLast Updated Time: 20-Aug-2014 11:45