Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

INFO30006 Information Security & Privacy (UniMelb)— Complete HD Notes (Weeks 1–12) | Exam-Ready Summary & Model Answers

Rating
-
Sold
1
Pages
130
Uploaded on
08-12-2025
Written in
2025/2026

This document is a complete, high-distinction quality summary of the entire INFO30006 “Information Security & Privacy” subject (Weeks 1–12). Spanning over 16,000+ words across 129 pages, it is one of the most comprehensive and exam-aligned resources available. It includes every lecture except Week 9 (public holiday; no content delivered), and consolidates Weeks 1–12 into clear, structured, and easy-to-revise notes. The document also contains summary mindmaps and custom graphics that visually explain complex concepts such as CIA/AAA, threat modelling, TLS flows, DNS attacks, BGP routing, cryptography, ransomware kill chains, and more. Inside you will find: Full coverage of all examinable topics: CIA/AAA, threat modelling, authentication, cryptography, network security, endpoint/device security, AI & cybersecurity, cybercrime, DoS/DDoS, DNS, BGP, privacy, and organisational security Detailed lecture breakdowns with clean formatting, bullet-point clarity, and high readability Exam-ready long-response answers (Crossfire, TLS, DNSSEC vs DoH, Colonial Pipeline, ransomware economics, cybercrime models, etc.) Summary diagrams, mindmaps and graphics to reinforce understanding and speed up revision Mnemonics, glossaries, formula-style definitions, and memory aids for fast recall Case studies: Stuxnet, WannaCry, Estonia, Pakistan/YouTube, Equifax, Capital One, ShadowHammer, etc. Perfectly structured week-by-week notes, ideal for both deep study and last-minute revision This resource is ideal for: Students aiming for an H1 / HD Anyone who missed lectures or needs clean, complete notes Final exam preparation and concept reinforcement Replacing incomplete class notes with a polished, structured reference If you want one single document that gives you everything needed to succeed in INFO30006, this is it. Clear, comprehensive, exam-focused, and designed for top-tier performance.

Show more Read less
Institution
Course

Content preview

WEEK 1 — Why Is Computer Security So Hard?

INFO30006 — Enhanced Master Notes

(Based on your notes + Lecture 1b slides + instructor commentary)



1. Big Picture: What Makes Cybersecurity Hard?

⭐ Core Question: Why is defence so much harder than attack?



1.1 Defender–Attacker Asymmetry

Attackers:

 Only need 1 weak link

 Adaptive, intelligent, creative

 Have no rulebook

 Low cost, high payoff

Defenders:

 Must protect every point of failure

 Operate under budget/time constraints

 Face shifting regulations, systems, and user behaviour

📌 Memory Aid — “AOD”

 Attacker needs A single point

 Organisation must guard Own everything

 Defender must succeed Daily



1.2 Scale of Attack (Internet Amplification)

 Internet = global attack surface

 High bandwidth → attacks replicate quickly

 Malware, phishing, DDoS scale automatically

💡 Real-world example:
WannaCry worm (2017) spread automatically to 230k machines within
hours.

,1.3 Pace of Technology Evolution

 Rapid hardware + software churn

 Continuous patching needed

 Leads to patch lag → vulnerability window

📌 Eric Johnson’s lesson (Week 6 preview):
→ “Cyber hygiene must keep up with innovation.”



1.4 Software Complexity Increases Attack Surface

 More features → more bugs

 More integrations → more misconfigurations

 Requires tools like Splunk SIEM to detect anomalies
(see W6 guest lecture )

🔎 Example:

 Log4j vulnerability spread because complex Java logging systems
are embedded everywhere.



1.5 “Features Beat Security”

Companies and users prioritise:

 Convenience

 Time-to-market

 User experience

over security.

IoT example from lecture :

“Cats need food hourly → smart feeders online → IoT with weak security.”



1.6 Market Economics Misalign Incentives

 Who pays ≠ who benefits

 Vendors ship products fast; users bear the breach cost

 Hard to justify security ROI until after disaster

Instructor example (Chris Gatford talk):

,Vendors don't earn revenue from reducing your attack surface.



1.7 Missing Context of Danger (Human Factors)

Users cannot sense digital risk:

 No physical cues

 No risk intuition

 Susceptible to phishing/whaling

(Will connect to Week 2 Human Factors).



1.8 Human Factors (Huge Topic)

From lecture and your notes:

8a. User Non-compliance

 Password reuse

 Ignoring VPN

 Circumventing security for convenience
→ Fix: Use MFA/passkeys, automate updates, least privilege.

8b. Error-inducing Design

 Misleading UI

 Confusing warnings

 Unsafe defaults
→ Fix: Good UX, clear risk prompts, undo/confirm actions.

8c. Non-expert Users

 Don’t understand threats

 Can't identify phishing
→ Fix: Simulated phishing training, easy report buttons.

This category alone explains 30–50% of major breaches.



2. Threat Protection Lifecycle (Detect → Defend → Respond)

(From lecture slides: )

2.1 Detect

,  Real-time monitoring

 SIEM (Splunk, Elastic)

 Logging visibility

2.2 Defend

 Firewalls, access control

 Encryption

 Patching

 Segmentation

2.3 Respond

 Incident response plans

 Backups

 Forensics

 Recovery

📌 Mnemonic — DDR:
Detect → Defend → Respond.



3. Security Goals — CIA + AAA (CIAAAA Model)

(Mapped from NIST + lecture slides )



3.1 CIA Triad

Confidentiality — “No unauthorised reading”

Methods:

 Encryption (TLS/HTTPS, AES, RSA)

 Access control

 Least privilege

Integrity — “No unauthorised modification”

Methods:

 MACs (Message Authentication Codes)

 Checksums

Written for

Institution
Course

Document information

Uploaded on
December 8, 2025
Number of pages
130
Written in
2025/2026
Type
Class notes
Professor(s)
Suelette dreyfus
Contains
All classes

Subjects

$10.89
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
samhou

Get to know the seller

Seller avatar
samhou University of Melbourne
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
5 months
Number of followers
0
Documents
1
Last sold
5 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions