0% found this document useful (0 votes)
118 views2 pages

CO DFP40263 Secure Mobile Computing

The Secure Mobile Computing course (DFP40263) focuses on vulnerabilities and threat vectors associated with mobile devices, emphasizing mitigation techniques and security configurations. Students will learn to manipulate mobile computing principles, work effectively in teams, and demonstrate best practices in mobile security. The course includes continuous assessment (70%) and final assessment (30%), covering topics such as information security, mobile computing technologies, and mobile vulnerabilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views2 pages

CO DFP40263 Secure Mobile Computing

The Secure Mobile Computing course (DFP40263) focuses on vulnerabilities and threat vectors associated with mobile devices, emphasizing mitigation techniques and security configurations. Students will learn to manipulate mobile computing principles, work effectively in teams, and demonstrate best practices in mobile security. The course includes continuous assessment (70%) and final assessment (30%), covering topics such as information security, mobile computing technologies, and mobile vulnerabilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DEPARTMENT OF INFORMATION & COMMUNICATION TECHNOLOGY

COURSE OUTLINE

NAME OF COURSE SECURE MOBILE COMPUTING


1.
COURSE CODE DFP40263
SYNOPSIS SECURE MOBILE COMPUTING course appraises vulnerabilities and
threat vector associated with Mobile Computing devices. This course
contains a specifis emphasis on mitigation techniques including security
2. configurations as well as security software.

3. CREDIT VALUE 3
PREREQUISITE/ NONE
4.
CO-REQUISITE (IF ANY)
COURSE LEARNING OUTCOMES (CLO):
Upon completion of this course, students should be able to:
CLO1 Manipulate the aspect of mobile computing, model and security principles
using mobile computing technology to develop applications. (P3, PLO3)
Develop effective leadership and team work related to mobile secure
CLO2
environment. (A4, PLO5).
CLO3 Demonstrate best practices in developing mobile security computing
in context of social environment. (A3, PLO8)

PROGRAMME LEARNING OUTCOMES (PLO):


5. PLO3 - display Information and Communication Technology (ICT) skill in performing diagnostic and
documenting processes in ICT related fields
PLO5 - demonstrate social skills and responsibilities by taking alternate role as a leader or member of a
diverse team
PLO8 - demonstrate positive values, ethics and accountability in engaging with society

ASSESSMENT METHOD:
The course assessment consist of:
i. Continuous Assessment (CA) – 70%
ii. Final Assessment (FA) – 30%
6.
(Practical Test)

Assessment Quantity Percentage


(%)
Practical Exercise 4 20%
Problem Based Task (PBT) 1 20%
Case Study 1 20%
Case Study Presentation 1 10%
TEACHING SCHEDULE:
Topic Topic/Content Assessment Week
No. Method
1.0 INFORMATION SECURITY OVERVIEW
1.1 Displays the need for information security W1 – W2
1.2 Measures potential risks to information security

2.0 MOBILE COMPUTING TECHNOLOGIES


PE 1
2.1 Displays the basics of mobile computing
2.2 Displays wireless system architecture PE 2
2.3 Discuss Mobile computing OS W2 – W4

3.0 MOBILE COMPUTING SECURITY


PE 3 W5 – W8
3.1 Calibrates CIA Triad in mobile computing
3.2 Measures mobile risk ecosystem
7. 3.3 Reacts to Mobile Hacking
3.4 Measures mobile phone security and forensics

4.0 MOBILE VULNERABILITIES PE 4


4.1 Displays vulnerabilities, threats and attacks. W9 –
PBT W14
4.2 Displays vulnerabilities in mobile computing
4.3 Measures threats in mobile computing Case Study 1
4.4 Explain attacks in mobile computing Case Study
Presentation

REFERENCES Main :
1. Blokdyk. G. (2020). Security Vulnerabilities In Mobile
Operating Systems A Complete Guide - 2020 Edition Kindle
Edition. Kindle. (ASIN: B088NLZ2JC)
8. 2. Suparna. B. &. Sarmistha. N. (2017). Secure and Trusted
Checkpointing Recovery in Mobile Computing: On Design of
Mobility based Checkpointing Algorithms considering Security
and Trust in Mobile Cellular and Adhoc Network, LAP
LAMBERT Academic Publishing (ISBN: 9783330036222)

Additional :
1. Chestnykh. D. (2020). Password Authentication for Web and
Mobile Apps: The Developer's Guide To Building Secure User
Authentication. Independently published. (ISBN: 979-
8649303095)
2. Fadly. J. J. &. Farhana. A. P. (2018). Secure Mobile
Computing. Politeknik Sultan Abdul Halim Mu’adzam Shah.
(ISBN: 978-967-0830-51-3)
3. Au. M. H. & Choo. R. R. (2017). Mobile Security and Privacy:
Advances, Challenges and Future Research Directions,
Elsevier Inc. (ISBN: 9780128064296)

Prepared by: Verified by :

……………………… …………………………….
( Tandatangan dan Nama Pensyarah Kursus ( Tandatangan dan Nama TP(A)/TP/KJ/KPro/KUPA/KK )

Date : Date :

You might also like