Unit Outline
KIT515
Cybersecurity Policies and Practices
Semester 1, 2026
Mira Park
School of Information and Communication Technology
Sciences and Engineering (Portfolio)
CRICOS Provider Code: 00586B
Unit Coordinator
Mira Park
Email: Mira.Park@utas.edu.au
What is the Unit About?
Unit Description
 
This unit explores cybersecurity as it is managed in the business context. It covers the processes of threat and risk analysis, security policy development, incident prevention and response, issues around privacy, professional codes of conduct, and looks at legislative efforts around the world intended to address privacy and cybersecurity issues. It also looks at the ethical issues that cybersecurity research raises, and the ways that this affects how cybersecurity researchers can operate.
Intended Learning Outcomes
As per the Assessment and Results Policy 1.3, your results will reflect your achievement against specified learning outcomes.
On completion of this unit, you will be able to:
1
Analyse industry approaches to cybersecurity practices as they relate to privacy and the law
2
Investigate and communicate effective policies and processes designed to improve an organisation's cybersecurity posture
3
Develop a cohesive security policy for a company that meets their threat and risk profile
4
Discuss the ethical issues that cybersecurity researchers face to assess the ethicality of given scenarios
Alterations as a result of student feedback
The assessment structure has been revised in response to student feedback
 
 
Teaching arrangements
ATTENDANCE MODE
TEACHING TYPE
LEARNING ACTIVITY
CONTACT HOURS
FREQUENCY
On Campus
Tutorial
A structured real-time (i.e. synchronous) activity in a small-group setting where the primary purpose is the clarification, exploration or reinforcement of subject content presented or accessed at another time or place (e.g. lecture, preparatory work). It is reliant on student-teacher and student-student interaction and dialogue for achievement of its learning outcomes. The students enrolled in the tutorial are expected to attend.
2
Weekly
Online
Lecture (Online)
A real-time (i.e. synchronous) interactive activity involving the whole class whose primary purpose is the presentation and structuring of information/ideas/skills to facilitate student learning. All students are expected to attend.
2
Weekly
Individual Study
Involving reading, listening to audio, watching video, and/or completing exercises and/or quizzes, self-study is individual work undertaken when the student chooses (i.e. asynchronous), most likely through engagement with MyLO. The content is examinable, and may need to be completed prior to attending classes and/or attempting assessment tasks.
1
Weekly
Attendance / engagement expectations
If your unit is offered On campus, it is expected that you will attend all on-campus and onsite learning activities. This is to support your own learning and the development of a learning community within the unit. If you are unable to attend regularly, please discuss the situation with your course coordinator and/or our UConnect support team.

If your unit is offered Online or includes online activities, it is expected you will engage in all those activities as indicated in the Unit Outline or MyLO, including any self-directed learning.

If you miss a learning activity for a legitimate reason (e.g., illness, carer responsibilities) teaching staff will attempt to provide alternative activities (e.g., make up readings) where it is possible.
 
 
 
 
How will I be Assessed?
 
For more detailed assessment information please see MyLO.
Assessment schedule
ASSESSMENT TASK #
ASSESSMENT TASK NAME
DATE DUE
WEIGHT
LINKS TO INTENDED LEARNING OUTCOMES
Assessment Task 1:
Individual Essay
Week 3
10 %
LO1, LO4
Assessment Task 2:
Scholarly research report with advanced/AI-supported creative tools
Week 5
20 %
LO2, LO3
Assessment Task 3:
Case studies and Quizzes during Tutorials
Refer to Assessment Description
30 %
LO1, LO2, LO3, LO4
Assessment Task 4:
Group Project
Refer to Assessment Description
40 %
LO1, LO2, LO3, LO4
 
Assessment details
Assessment Task 1: Individual Essay
Task Description:
This assessment task is an individual essay that requires students to explore a contemporary cybersecurity issue related to privacy, the law, and professional ethics. Students are expected to select a focused topic, conduct in-depth research, and critically analyse both the legal and ethical dimensions.
The essay is a scholarly endeavour designed to move beyond surface-level understanding. Students should integrate legal frameworks (e.g. GDPR, Privacy Act 1988, or other relevant regulations), case studies, and professional ethical perspectives. The task is intended to stimulate expansive thinking, encourage boundary-pushing ideas, and foster creativity in presenting well-reasoned arguments.
Task Length:
1000 words
Due Date:
Week 3
Weight:
10 %
 
CRITERION #
CRITERION
MEASURES INTENDED
LEARNING OUTCOME(S)
1
Research and provide an explanation of the ethical, privacy, and legal issues involved in cybersecurity research
LO1, LO4
 
Assessment Task 2: Scholarly research report with advanced/AI-supported creative tools
Task Description:
This assessment task is a scholarly endeavour that necessitates an in-depth exploration of contemporary cybersecurity topics. The scope of potential topics is extensive, allowing students to select a subject that aligns with their academic interests. Students are expected to thoroughly analyse their chosen topic, integrating their unique viewpoints and insights into their work. The objective of this task extends beyond mere comprehension of the subject matter. It is designed to stimulate expansive thinking, encourage boundary-pushing ideas, and foster the development of creative skills.
In addition to written analysis, students are encouraged to use various advanced tools, such as AI-supported presentation schemes, to enhance the originality and depth of their work and to demonstrate creativity in how ideas are presented.
Task Length:
2000 words
Due Date:
Week 5
Weight:
20 %
 
CRITERION #
CRITERION
MEASURES INTENDED
LEARNING OUTCOME(S)
 
1
Analyse and research business needs with respect to security
LO2, LO3
2
Explore risks and threats to the business
LO2, LO3
 
Assessment Task 3: Case studies and Quizzes during Tutorials
Task Description:
In each tutorial from Week 2 to Week 12, students will work in groups to analyse and develop policies and practices related to security. These activities are designed to review the weekly lecture content. The assessment for this task has two components: a group-based tutorial task completion component and an individual quiz component.
During tutorials, students will:

* Complete tutorial tasks in groups (Week 2 to Week 11): As a group, you will be assessed on the completion and quality of the in-tutorial tasks. Each week's group task is worth 1% of the final grade. The tasks are designed to review lecture materials and apply them to practical scenarios.

* Complete short individual quizzes (Week 3 to Week 12): Individually, you will complete a short quiz at the end of each tutorial to test your personal understanding of the concepts discussed. Each weekly quiz is worth 2% of the final grade. The quizzes are to test comprehension and reinforce lecture learning.
Task Length:
10 Tutorials, 10 Quizzes
Due Date:
Refer to Assessment Description
Weight:
30 %
 
CRITERION #
CRITERION
MEASURES INTENDED
LEARNING OUTCOME(S)
1
Analyse and research business needs with respect to security
LO2
2
Write security policies relevant to business needs
LO3
3
Research and explain ethical, privacy and legal issues involved in cybersecurity research
LO1, LO4
 
Assessment Task 4: Group Project
Task Description:
Working as a group, you will engage in a multi-stage project to research, design, and write comprehensive cybersecurity policies for a small to medium enterprise (SME). You will create a case study, conduct a formal risk assessment, design an incident response plan, and develop a cohesive security policy, integrating advanced knowledge and industry-standard frameworks. Your group must critically analyse, reflect on, and synthesise complex information, research, and apply established theories, and demonstrate autonomy and expert judgement as practitioners. Individual grades will be calibrated based on each participant's contribution as evaluated through peer assessment.
Project Components and Weighting:
1. Case Study Creation (5%) - due in week 8
* Develop a realistic and nuanced SME scenario, detailing the organisation’s business operations, IT infrastructure, and potential vulnerabilities.
* Include a description of the company’s size, industry, and typical workflows to contextualise security needs.
* This component forms the foundation for the rest of the project.
2. Business Risk Assessment and Threat Analysis (10%) - in week 8
* Your task for this component has two sequential parts:
a. Fill in the Template: Based on your case study from Component 1, you must first populate the 'Business Risk Assessment for Cybersecurity' template. This involves identifying and recording key assets, their value, potential vulnerabilities, threats, and any current controls.
b. Conduct the Risk Assessment: Once the template is filled, you will use the data within it to conduct your formal risk assessment and threat analysis. Your analysis must include rigorous qualitative and quantitative evaluations to justify the risk ratings for each identified threat.
3. Incident Response Plan (10%) - in week 10
* Design a structured and adaptable incident response plan.
4. Developing a Comprehensive Security Policy (15%) - in week 12
* Utilise the findings from your risk assessment to construct a comprehensive and structured cybersecurity policy that addresses identified threats, vulnerabilities, and mitigation strategies.
Task Length:
10,000 words
Due Date:
Refer to Assessment Description
Weight:
40 %
 
CRITERION #
CRITERION
MEASURES INTENDED
LEARNING OUTCOME(S)
1
Critically Analyse and Synthesise complex business requirements to define an integrated cybersecurity posture
LO2
2
Develop a Cohesive and Professional Security Policy that synthesises risk assessment
LO3
3
Explore security improvements for a business
LO2
4
Research and provide an explanation of the ethical, privacy, and legal issues involved in cybersecurity research
LO1, LO4
 
 
 
How your final result is determined
To pass this unit, you need to demonstrate your attainment of each of the Intended Learning Outcomes, achieve a final unit grade of 50% or greater, and pass any hurdle tasks.
Academic progress review
The results for this unit may be included in a review of your academic progress. For information about progress reviews and what they mean for all students, see Academic Progress Review in the Student Portal.
Submission of assignments
Where practicable, assignments should be submitted to an assignment submission folder in MYLO. You must submit assignments by the due date or receive a penalty (unless an extension of time has been approved by the Unit Coordinator). Students submitting any assignment in hard copy, or because of a practicum finalisation, must attach a student cover sheet and signed declaration for the submission to be accepted for marking.
Academic integrity
Academic integrity is about acting responsibly, honestly, ethically, and collegially when using, producing, and communicating information with other students and staff members.

In written work, you must correctly reference the work of others to maintain academic integrity. To find out the referencing style for this unit, see the assessment information in the MyLO site, or contact your teaching staff. For more detail about Academic Integrity, see
Important Guidelines & Support.
Requests for extensions
If you are unable to submit an assessment task by the due date, you should apply for an extension.
 
A request for an extension should first be discussed with your Unit Coordinator or teaching support team where possible. A request for an extension must be submitted by the assessment due date, except where you can provide evidence it was not possible to do so. Typically, an application for an extension will be supported by documentary evidence: however, where it is not possible for you to provide evidence please contact your Unit Coordinator.
 
The Unit Coordinator must notify you of the outcome of an extension request within 3 working days of receiving the request.
Late penalties
Assignments submitted after the deadline will receive a late penalty of 5% of the original available mark for each calendar day (or part day) that the assignment is late. Late submissions will not be accepted more than 10 calendar days after the due date, or after assignments have been returned to other students on a scheduled date, whichever occurs first. Further information on Late Penalties can be found on the Assessments and Results Procedure.
 
Review of results and appeals
You are entitled to ask for a review of the marking and grading of your assessment task if there is an irregularity in the marking standards or an error in the process for determining the outcome of an assessment. Details on how to request a review of a mark for an assignment are outlined in the Review and Appeal of Academic Decisions Procedure.