UQ Students should read the Disclaimer & Warning
Note: This page dates from 2005, and is kept for historical purposes.
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- saved from url=(0094)http://www.itee.uq.edu.au/undergraduate/_profile_view.php?print=1&file=2004_2_COMP3502_StLucia -->
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>COMP3502 – Course Profile</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
</head>
<body>
<h3 >The University of Queensland<br />
School of Information Technology and Electrical Engineering<br />
Semester 2, 2004</h3>
<h1 >COMP3502 – Information Security<br />
COMP7506 – Information Security</h1>
<h1 >Course Profile</h1>
<h4>Version</h4>
<p>This is version 2.1 of the COMP3502 course profile, dated 20 July 2004.</p>
<h4>Change Log</h4>
<p>2.1: Updated UQ phone number, fixed broken bibliography link, minor HTML styling,
fixed typo, fixed calendar dates.<br />
2.0: Major update. New learning outcomes, contact details, textbook, graduate
attributes, learning activities, and assessment activities.</p>
<hr />
<h2>1. Course Summary</h2>
<table id="AutoNumber6"
cellspacing="1" border="1">
<tbody>
<tr>
<td ><b>Course Code(s):</b></td>
<td><b>COMP3502 and COMP7506</b></td>
</tr>
<tr>
<td ><b>Unit Value:</b></td>
<td>#2</td>
</tr>
<tr>
<td ><b>Contact Hours:</b></td>
<td>3 hours per week (2L1T)</td>
</tr>
<tr>
<td ><b>Purpose:</b></td>
<td>COMP3502 and COMP7506 introduce the field of information security. </td>
</tr>
</tbody>
</table>
<hr />
<h2>2. Teaching Staff</h2>
<table cellspacing="1"
border="1">
<tbody>
<tr>
<td colspan="2"><b>Course Coordinator: Associate Professor John Yesberg</b></td>
</tr>
<tr>
<td>Office:</td>
<td>78-306</td>
</tr>
<tr>
<td>Phone:</td>
<td>(07) 3332 7664 (DSTO) or 3365 2883 (UQ). I will rarely be available at
the UQ phone - I recommend the DSTO number. </td>
</tr>
<tr>
<td>Email:</td>
<td>jdy[at]itee.uq.edu.au. Note that although I may reply from my DSTO email,
it is to students' advantage if further replies are still addressed to the
UQ account, so that it is available from my UQ office.</td>
</tr>
<tr>
<td>Consultation:</td>
<td>In person, after lectures and Monday afternoon tutorial, or by appointment
(preferably use email to make an appointment). There will be extensive opportunities
for consultation during the Swot-Vac week prior to exams. Note that Dr Yesberg
works primarily for the Defence Science and Technology Organisation, which
has given permission for him to teach this course. </td>
</tr>
<tr>
<td colspan="2"><b>Tutor: Tim Cederman-Heysom (To be confirmed)</b></td>
</tr>
<!--
<tr>
<td colspan="2"><b>Tutor: Andrew Whitby (To be confirmed)</b></td>
</tr>
-->
</tbody>
</table>
<hr />
<h2>3. Course Goals</h2>
<p>The goal of the course is to introduce the field of information security.
Upon successful completion of the course, students should be able to:</p>
<ol>
<li>explain and apply the vocabulary used in the field; </li>
<li>explain and analyse mechanisms that provide the key security services of
authentication and access control, including passwords, biometrics, and cryptography; </li>
<li>explain and apply techniques from risk management, probability theory, including
information theory and entropy, to analyse security systems; </li>
<li>locate, interpret, and critically judge academic and other literature in
the field; </li>
<li>explain ethical and legal considerations that apply to the learning and
practice of information security; </li>
<li>explain the adversarial nature of security, and the asymmetric nature of
offensive and defensive roles; and </li>
<li>describe some of the threats and countermeasures in a range of computing
applications.
<!--
<LI>Understand the terms used in information security, including
confidentiality, integrity, availability, authentication, access control,
entropy, public-key, signature, certificate, and assurance;
<LI>Analyse and manage risks and threats that may be faced by an information
system (computer or network);
<LI>Design countermeasures to protect a system against certain threats;
<LI>Understand strengths and weaknesses of different types of authentication
and access control mechanisms;
<LI>Use security policy models to describe access control requirements;
<LI>Understand the application of cryptography in digital signatures and
security protocols;
<LI>Understand the key concepts and principles of firewalls, malicious
software, database security, and intrusion detection;
<LI>Understand the principles for designing and evaluating highly secure
systems;
<LI>Be able to apply critical judgement claims made about security products;
<LI>Understand ethical issues arising from privacy and copyright; and
<LI>Be able to undertake independent research on security topics. </LI>
-->
</li>
</ol>
<h3>3.1 Assumed Background</h3>
<p>This course does not have any compulsory prerequisite courses. Students will
require a general computing background, consistent with having completed two
years of a bachelor's degree in Computer Science or Information Technology.</p>
<p>There is no programming <i>required</i>, although one of the options for Assignment
2 will be a programming task. The only permissible programming languages for
this task are Java, C, and C++.</p>
<p>Prerequisite courses: none. <br />
Recommended (not compulsory): COMP2301 or COMS2000 or 3200 or CS229 or
233 or 332 or 334 or 336 or E3429 </p>
<p>Corequisite courses: none. <br />
Recommended (not compulsory): COMP3300 or COMS3200 or CS309 or 336 </p>
<p>Incompatible courses: COMM3905 or CO392 or ID360 </p>
<hr />
<h2>4. Resources</h2>
<h3>4.1 Textbook</h3>
I have prepared a <b>COMP3502/7506 course reader</b> which contains both the
lecture notes and extracts from some of the references that you are required
to obtain. It will be available from Print On Demand. (I have not been able to
find any textbooks which adequately and cost-effectively cover the content for
this course.) There are some reference books, which you can find in the library,
which may be useful for some parts of the course. Details are on the COMP3502
bibliography page.
<h3>4.2 Handouts</h3>
<p>General ITEE policy is not to distribute paper handouts, but to make them
available on the web. Students have the choice to print them if appropriate. </p>
<h3>4.3 Computing Facilities</h3>
An accounts will be created on the ITEE network for each student. The account
will have Internet access.
<h3>4.4 Distribution of Notices</h3>
<p>Notices will generally be distributed by email, and on the course newsgroup
(see below).</p>
<h3>4.5 Web</h3>
<p>The course web site is available at http://www.itee.uq.edu.au/~comp3502. The
course web site will contain:</p>
<ul>
<li>Lecture notes </li>
<li>Bibliography </li>
<li>Tutorial questions and answers </li>
<li>Assignment questions and answers </li>
<li>Results information </li>
</ul>
<h3>4.6 Newsgroup</h3>
<p>The course newsgroup is uq.itee.comp3502. This group is available on both
the University and School news servers (news.uq.edu.au and news.itee.uq.edu.au).
Students are required to monitor the newsgroup at least weekly.</p>
<p>Students are free to post questions (and answers!) to the newsgroup. Copies
of announcements will also be posted to the newsgroup. The teaching staff will
monitor the newsgroup. </p>
<hr />
<h2>5. Learning Activities</h2>
<table cellspacing="1"
border="1">
<tbody>
<tr>
<td>Readings</td>
<td>A portion of the course reader will be assigned for each week. Students
will be expected to have read the material prior to that week's lecture and
tutorial.</td>
</tr>
<tr>
<td>Lectures</td>
<td>Lectures will be on Mondays, 2pm-4pm, in 63-358. In lectures, we will
explore the topic from the reading in further detail and sometimes from alternative
points of view. There will be some opportunities for small-group activities
during the lectures. </td>
</tr>
<tr>
<td>Tutorials</td>
<td>Tutorials are scheduled as shown in the following table. (Note that SI-net
is the authoritative source for timetable information, and that there are
no tutorials in the first week.)
<table>
<tbody>
<tr>
<td>Ta</td>
<td>Tb</td>
<td>Tc</td>
<td>Td</td>
<td>Te</td>
</tr>
<tr>
<td>Mon 4pm</td>
<td>Mon 5pm</td>
<td>Wed 10am</td>
<td>Fri 12pm</td>
<td>Fri 1pm</td>
</tr>
<tr>
<td>78-224</td>
<td>78-344</td>
<td>01-E301</td>
<td>51-207</td>
<td>51-207</td>
</tr>
</tbody>
</table>
Students are expected to sign up for one of these tutorials.
There will be a tutorial question sheet for each tutorial. Students are expected
to have attempted the questions before attending the tutorial. Tutorials
are interactive opportunities to amplify and reinforce learning. </td>
</tr>
<tr>
<td>Cryptographer's Workbench</td>
<td>The Cryptographer's Workbench is an online tutorial-style system which
will help students learn about various aspects of cryptography. Students
will be lead through a sequence of steps designed to teach security aspects
of cryptography. After initial demonstrations during the lectures, this will
be an unsupervised activity, which can be done at the student's own pace
on any computer connected to the network. </td>
</tr>
<tr>
<td>Assignments</td>
<td>Students will be required to survey recent literature from the Internet
and from peer-reviewed journals to prepare essays. <br />
The first assignment will cover issues relating to ethics and
evidence.<br />
Students will be given a set of topics from which to choose for
their second assignment.</td>
</tr>
<tr>
<td>Peer Assessment</td>
<td>Students will be required to assess each other's tutorial question sheet
submissions and results from the Cryptographer's Workbench. Seeing and judging
other students' answers and explanations is a valuable learning activity.</td>
</tr>
</tbody>
</table>
<b>Attendance.</b> You are not <i>required</i> to attend any of the teaching
sessions (except those in which an assessment activity is taking place), however,
you are <i>strongly encouraged</i> to do so. The lectures, tutorials and pracs
have been specifically designed to aid your learning of the course material.
Failure to attend a session may result in you being disadvantaged. It is up to
you to find out what happened at any class session that you miss.
<hr />
<h2>6. Assessment Activities</h2>
<table cellspacing="1"
border="1">
<tbody>
<tr>
<td>Tutorial Sheets</td>
<td>Selected questions on each of the tutorial sheets will need to be answered
and submitted for marking. The questions will be marked by other students.
Students will be provided with comments in feedback from their peers. The
peer assessment will not count towards a final grade.<br />
Some of the submitted questions will <em>also</em> be marked by lecturer
and tutors. These questions will count towards the student's final grade.
Students will not know beforehand which questions will count towards the
grade, and will therefore attempt all submitted questions as though they
counted. </td>
</tr>
<tr>
<td>Cryptographer's Workbench</td>
<td>The Cryptographer's Workbench is effectively an on-line tutorial, and
it will be assessed in the same way as the other tutorials. Peers will assess,
and give feedback on answers that are submitted (electronically). Some of
these answers will also be marked by the lecturer and tutors, and count towards
the final grade.<br />
Students are encouraged to work together on Cryptographer's Workbench
activities, but explanations in answers should not be copied word-for-word
from colleagues. Note that each student will have slightly different questions,
and so the answers will not all be identical. </td>
</tr>
<tr>
<td>Peer Assessment</td>
<td>Students will be required to mark other students' work. It is a compulsory
activity, and students who do not assess the necessary work will not be able
to achieve a grade higher than 4. There will be no numeric mark or feedback
given on students' assessment of others' work.</td>
</tr>
<tr>
<td>Assignments</td>
<td>Two (primarily) essay-style assignments will be set. These will be marked
by the lecturer and tutors, and the marks will count towards the final grade. <br />
Hard-copy assignments will be submitted to the submission box
on level 1 of building 78. Your assignment submission <b>must</b> be accompanied
by a signed coversheet declaring that the submission is your original work.
Assignments will be returned to the boxes across the hallway from the submission
boxes.</td>
</tr>
<tr>
<td>Midsemester Exam</td>
<td>This will be a brief (25 minutes) test comprising 20 multiple-choice questions
at the beginning of the lecture. Students will be required to bring a HB/2B
pencil to this class.<br />
This test will cover everything that has been covered in the
lectures, readings, and tutorials prior to the test. </td>
</tr>
<tr>
<td>Final Exam</td>
<td>The final exam will have two parts. The first part will be <em>closed-book</em>,
and have multiple choice questions. It will last approximately 30 minutes,
after which the answer sheets will be collected. HB or 2B pencils will be
required for this part.<br />
The second part will be <em>open-book</em>, and require short and medium
answers. There will be no essays. Students will have up to three hours (although
it is anticipated that most students will finish in less than two hours).
The final exam will cover material from the whole course. </td>
</tr>
</tbody>
</table>
<!--<P>COMP3502 will be assessed by several methods as outlined below. Your final
grade (on a 1 to 7 scale) will be determined by combining the marks from the
various assessment components as described below. For each assessment item,
reference is made to the specific learning objectives (from the list above)
which the assessment item will address. </P>
<H3>Assignments</H3>
<P>The first assignment will require some independent research into ethical
issues of privacy and copyright, and critical judgement of security claims made
in typical security product marketing statements. </P>
<P>The second assignment will require further independent research into a more
technical aspect of information security, or the development of some software
that demonstrates a particular security vulnerability. </P>
<H3>Mid-semester test</H3>
<P>This test will be held during the first 30 minutes of the normal lecture for
the week indicated above. It will cover all subject matter that has been taught
by that time, including terminology, risk management, authentication, access
control, security policies, and some cryptography. No calculators will be
permitted. The test will be multiple choice. Students will be required to bring
a 2B or HB pencil to the test.
<H3>Final Examination</H3>
<P>The final exam will test the student's in-depth knowledge of the field. A two
hour final examination will be held during the final examination period. This
exam will be <B>closed-book</B>. It will contain both multiple-choice and
short-to-medium answer questions. Students are reminded that examinations from
previous years are available for perusal. You will <B>not</B> be permitted to
use a calculator in the exam. You will require a HB or 2B pencil and an eraser
to complete the exam.</P> -->
<h3>6.1 Feedback</h3>
All items of assessment (except the final exam) will have "formative" and "diagnostic" characteristics.
That is, students will learn by doing the activity, and the feedback will help
students and teachers work out how effective the learning is.<br />
The results of "summative" assessment (ie. assessment that counts towards the
final grade) will be recorded in a database, and made available (but password-protected
for privacy) for students to check on-line.<br />
Students are required to ensure that the mark in the database corresponds to
that of any hard copy within two weeks of the hard copy being returned.
<h3>6.2 Late Submission</h3>
<p>Late submissions <b>will not be accepted</b>. Students with a genuine excuse
(eg. medical certificate) may apply for a concession which will result in the
weighting of that assignment being set to zero, and the others' weights increased
proportionately.</p>
<h3>6.3 Academic Merit, Plagiarism, Collusion and Other Misconduct</h3>
<p>The School and the wider academic community in general takes academic integrity
and respect for other persons and property very seriously. In particular, the
following behaviour is unacceptable: </p>
<ul>
<li>Submission of plagiarised work, i.e. work that contains content copied from
an unacknowledged source. </li>
<li>Submission of work without academic merit, i.e. work that adds little or
nothing to material available from reference sources such as textbooks, websites,
etc., even where this is appropriately acknowledged. </li>
<li>Engaging in collusive behaviour, i.e. inappropriate working together with
other students where individual work is required, or working with people outside
your team where team work is required. </li>
<li>Copying work done by other students. </li>
<li>Failing to adhere to the School's regulations concerning behaviour in laboratories,
in particular occupational health and safety regulations. </li>
</ul>
<p>Penalties for engaging in unacceptable behaviour can range from cash fines
or loss of grades in a subject, through to expulsion from the University.<br />
<br />
You are required to read and understand the School Statement on Misconduct,
available on the ITEE website at: http://www.itee.uq.edu.au/about/student-misconduct.jsp <br />
<br />
If you have any questions concerning this statement, please contact your
lecturer in the first instance.</p>
<h3>6.4 Determination of Final Grade</h3>
<p>The final percentage is calculated as a weighted sum of the various pieces
of assessment. The "nominal" weights for the items are:</p>
<ul>
<li>15%: Tutorial and Cryptographer's Workbench Questions </li>
<li>15%: Assignment 1 </li>
<li>15%: Assignment 2 </li>
<li>10%: Mid-semester test </li>
<li>45%: Final exam </li>
</ul>
<p>However, the weighting of a student's <i>worst</i> piece of assessment will
be reduced by 10 percentage points (ie. from 10% to 0%, from 15% to 5%, or from
45% to 35%). Also, the weighting of the student's <i>best</i> piece of assessment
will be increased by 10 percentage points (ie. from 10% to 20%, 15% to 25%,
or 45% to 55%). This will mitigate the effects of a "bad day" due to a student
being unwell or similar complaint.</p>
<p>To be eligible for a grade of 5 or higher, at least 4 of the 5 pieces of assessment
will have to have marks greater than 50%.<br />
To be eligible for a grade of 6 or higher, at least 4 of the 5 pieces of
assessment will have to have marks greater than 60%.<br />
To be eligible for a grade of 7, at least 4 of the 5 pieces of assessment
will have to have marks greater than 70%.<br />
This requirement means that a single "bad day" cannot prevent a student from
achieving a high grade. </p>
<p>The final percentage will be converted to a grade as indicated in the following
table. If the distribution of results suggests that a slight downward modification
of the cutoff marks would result in fairer grades, this may be applied. (Note
that this operation can only be of benefit to students; it cannot reduce the
grade.) </p>
<table cellspacing="1"
border="1">
<tbody>
<tr>
<th>Final Percentage</th>
<th>Grade </th>
</tr>
<tr>
<td>85--100 </td>
<td>7 </td>
</tr>
<tr>
<td>75--85</td>
<td>6</td>
</tr>
<tr>
<td>65-75</td>
<td>5</td>
</tr>
<tr>
<td>50--65</td>
<td>4</td>
</tr>
<tr>
<td>45--50</td>
<td>3</td>
</tr>
<tr>
<td>20--45</td>
<td>2</td>
</tr>
<tr>
<td>0--20</td>
<td>1</td>
</tr>
</tbody>
</table>
<p>The weighting modification will automatically give each student some assistance
if they perform poorly in one piece of assessment. Calculations of a final percentage
will be made to several decimal places. Students cannot expect to rely on any "rounding" effects. </p>
<p>Note that in accordance with the ITEE policy on misconduct, work of "no academic
merit" will be given a mark of zero.</p>
<hr />
<h2>7. Topics and Schedule</h2>
The table below is an indicative outline of the topics for each week during the
semester. The method for teaching the course will be different from last year.
The timing and sequencing may be modified during the semester.
<table cellspacing="1"
border="1">
<tbody>
<tr>
<th>Week<br />
Number </th>
<th> Monday's <br />
Date</th>
<th>Lecture Topic</th>
<th>Tutorial</th>
<th> Assessment </th>
</tr>
<tr>
<td >1</td>
<td >26 July</td>
<td>Introduction. Terminology. Revision of mathematical foundations. Risk
Management.</td>
<td ><em>No tutorial</em></td>
<td></td>
</tr>
<tr>
<td >2</td>
<td >2 Aug</td>
<td>Authentication.</td>
<td>Sheet 1</td>
<td>Assignment 1 out.</td>
</tr>
<tr>
<td >3</td>
<td >9 Aug</td>
<td>Access Control.</td>
<td>Sheet 2</td>
<td>Assignment 2 out.<br />
Tut 1 Questions Due</td>
</tr>
<tr>
<td >4</td>
<td >16 Aug</td>
<td>Security policies and models.</td>
<td>Sheet 3</td>
<td>Tut 2 Questions Due<br />
Tut 1 Marks Due</td>
</tr>
<tr>
<td >5</td>
<td >23 Aug</td>
<td>Symmetric cryptography.</td>
<td>Sheet 4</td>
<td>Assignment 1 due<br />
Tut 3 Questions due<br />
Tut 2 Marks due</td>
</tr>
<tr>
<td >6</td>
<td >30 Aug</td>
<td>Block ciphers.</td>
<td>Workbench 1</td>
<td>Tut 4 Questions<br />
Tut 3 Marks due</td>
</tr>
<tr>
<td >7</td>
<td >6 Sept</td>
<td>Information theory and entropy.</td>
<td>Workbench 2</td>
<td>Assignment 1 back.<br />
Workbench 1 due.<br />
Tut 4 Marks due.</td>
</tr>
<tr>
<td >8</td>
<td >13 Sept</td>
<td>Public key cryptography.</td>
<td>Workbench 3</td>
<td>Mid-semester test.<br />
Workbench 2 due<br />
Workbench 1 Marks due</td>
</tr>
<tr>
<td >9</td>
<td >20 Sept</td>
<td>Security protocols.</td>
<td>Sheet 8</td>
<td >Workbench 3 due<br />
Workbench 2 Marks due</td>
</tr>
<tr>
<td ></td>
<td >27 Sept</td>
<td colspan="3"><i>Mid-semester break.</i></td>
</tr>
<tr>
<td >10</td>
<td >4 Oct</td>
<td>Database security.</td>
<td>Sheet 9</td>
<td>Tut 8 Questions due<br />
Workbench 3 Marks due</td>
</tr>
<tr>
<td >11</td>
<td >11 Oct</td>
<td>Malicious code.</td>
<td>Sheet 10</td>
<td>Assignment 2 due.<br />
Tut 9 Questions due<br />
Tut 8 Marks due</td>
</tr>
<tr>
<td >12</td>
<td >18 Oct</td>
<td>Firewalls. Intrusion detection.</td>
<td>Sheet 11</td>
<td>Tut 10 Questions due.<br />
Tut 9 Marks due.</td>
</tr>
<tr>
<td >13</td>
<td >25 Oct</td>
<td>Catch up and revision.</td>
<td>Sheet 12</td>
<td>Assignment 2 back.<br />
Tut 10 Marks due.</td>
</tr>
<tr>
<td >Swot Vac</td>
<td >1 Nov</td>
<td colspan="3"><i>One or two days during this week will be allocated to answering
students' questions and re-presenting explanations of complex topics on
demand.</i></td>
</tr>
</tbody>
</table>
<hr />
<h2>8. Outcome Cross Referencing</h2>
<h3>Assessment to Learning Objectives</h3>
<table cellspacing="1"
border="1">
<tbody>
<tr>
<td ><b>Learning Outcome</b></td>
<td ><b>Tutorial Sheets</b></td>
<td ><b>Cryptographer's Workbench</b></td>
<td ><b>Peer Assessment</b></td>
<td ><b>Assignments</b></td>
<td ><b>Midsemester Exam</b></td>
<td ><b>Final Exam</b></td>
</tr>
<tr>
<td>Explain and apply the vocabulary</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
</tr>
<tr>
<td>Explain and analyse mechanisms</td>
<td valign="bottom" >X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
</tr>
<tr>
<td>Risk management, probability theory, information theory and entropy</td>
<td valign="bottom" >X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
</tr>
<tr>
<td>Locate, interpret, and critically judge literature</td>
<td valign="bottom" ></td>
<td></td>
<td></td>
<td>X</td>
<td></td>
<td>X</td>
</tr>
<tr>
<td>Explain ethical and legal considerations</td>
<td valign="bottom" >X</td>
<td></td>
<td>X</td>
<td>X</td>
<td></td>
<td>X</td>
</tr>
<tr>
<td>Explain the adversarial nature of security</td>
<td valign="bottom" >X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
</tr>
<tr>
<td>Describe some of the threats and countermeasures</td>
<td valign="bottom" >X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
</tr>
</tbody>
</table>
<h3>Gradutate Attributes</h3>
<p>The University of Queensland has defined a set of graduate attributes to specify
broad core knowledge and skills associated with all undergraduate programs (
http://www.uq.edu.au/hupp/contents/view.asp?s1=3&s2=20&s3=5). The following
table identifies the assessment through which achievement of these graduate
attributes will be demonstrated:</p>
<table cellspacing="1"
border="1">
<tbody>
<tr>
<td ><b>Learning Outcome</b></td>
<td ><b>Tutorial Sheets</b></td>
<td ><b>Cryptographer's Workbench</b></td>
<td ><b>Peer Assessment</b></td>
<td ><b>Assignments</b></td>
<td ><b>Midsemester Exam</b></td>
<td ><b>Final Exam</b></td>
</tr>
<tr>
<td>In-depth knowledge of the field of study</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td>X</td>
</tr>
<tr>
<td>Effective communication</td>
<td valign="bottom" >X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td></td>
<td>X</td>
</tr>
<tr>
<td>Independence and creativity</td>
<td valign="bottom" >X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td></td>
<td></td>
</tr>
<tr>
<td>Critical judgement</td>
<td valign="bottom" ></td>
<td></td>
<td>X</td>
<td>X</td>
<td></td>
<td>X</td>
</tr>
<tr>
<td>Ethical and social understanding</td>
<td valign="bottom" >X</td>
<td>X</td>
<td>X</td>
<td>X</td>
<td></td>
<td>X</td>
</tr>
</tbody>
</table>
<hr />
<h2>9. Support for Students with a Disability</h2>
<p>Any student with a disability who may require alternative academic arrangements
in the course is encouraged to seek advice at the commencement of the semester
from a Disability Adviser at Student Support Services. </p>
</body>
</html>