0% found this document useful (0 votes)
152 views

Lahore College For Women University: Department of Computer Science

This document outlines a course on information security that covers key topics over 16 weeks. The course provides a foundation on network security issues and covers concepts like confidentiality, integrity, authentication, and cryptography. Specific topics include security protocols, network attacks and defenses, database security, malware, firewalls, and wireless security. The learning outcomes are for students to understand common threats, foundational security theory, and techniques for designing secure systems while thinking like adversaries. Coursework includes tests, assignments, quizzes, and a final exam evaluating theory, problem analysis, solution design, and social/ethical issues. Required textbooks and reference materials are also listed.

Uploaded by

saba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
152 views

Lahore College For Women University: Department of Computer Science

This document outlines a course on information security that covers key topics over 16 weeks. The course provides a foundation on network security issues and covers concepts like confidentiality, integrity, authentication, and cryptography. Specific topics include security protocols, network attacks and defenses, database security, malware, firewalls, and wireless security. The learning outcomes are for students to understand common threats, foundational security theory, and techniques for designing secure systems while thinking like adversaries. Coursework includes tests, assignments, quizzes, and a final exam evaluating theory, problem analysis, solution design, and social/ethical issues. Required textbooks and reference materials are also listed.

Uploaded by

saba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Lahore College for Women University

Department Of Computer Science


Course Outline (Weekly Plan)

CS-425 Information Security


Credit Hours 3 (3-0)
Program: BS-CS Semester: VIII

Pre Requisite : Computer Networks course Follow Up: None

Course Description
Information Security (3 semester hours) is a comprehensive study of the principles and practices of
computer system security including operating system security, network security, software security and web
security. The objective of this course is to provide a foundation of network related security issues. It builds
upon concepts of security such as confidentiality, integrity and authentication and on cryptography. Key
topics include security architecture, cryptographic systems, and security management tools. Specifically,
will study major security protocols and standards, network attacks and defenses, database security, virus,
malware, denial of service, firewalls, intrusion detection, and wireless security.

Course Objectives
This course is designed to understand major cryptographic systems and how they are applied inside a
computer network system and how to strategically design, implement, and maintain firewalls based on a
network's architecture and associated variables. Identify the different types of access control and site
security methods. Understand various attack methods used to target and exploit computer systems and
networks

Learning Outcomes
The learning outcome is students shall be able to understand what are the common threats faced today,
what are the foundational theory behind information security, what are the basic principles and techniques
when designing a secure system, how to think adversarially, how today's attacks and defenses work in
practice.
Be able to understand and explain concepts relating to protection of information systems against
unauthorized access to or modification of information in its various forms.

Textbooks
 Cryptography and Network Security: Principles and Practice (6th Edition) by William Stallings
Security in Computing (4th Edition) by Charles P. Pfleeger, Shari Lawrence Pfleeger

Reference Books / Material


 Computer Security: Art and Science, Matthew Bishop
 Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, George Kurtz. 2003
 Introduction to Network Security, by D. Jacobson, Chapman and Hall, 2009
 Papers from conferences and journals

Papers (required reading)


Selected research papers & technical specifications (will be itemized in class)

Course Distribution Theory: 30%


Problem Analysis: 20%
Solution Design: 45%
Social and Ethical Issues: 5%

Marks Distribution Test1:10 Marks,Test 2: 10Marks,Assignment:05Marks, Quiz: 5 Marks, FinalTerm:


55 Marks No Choice 03 hours, Practical:10 Marks, Attendance: 5 Marks

Technology Involved Multimedia, Web

Practiced Techniques Class Room Lecture, Presentation, Group Discussion


Lahore College for Women University
Department Of Computer Science
Course Outline (Weekly Plan)
Theory
Week Topic Recommendation of
Learning Activities
(Assignments,
Quizzes, Case study,
or reading
assignment)

1 Introduction: Basic Security Concepts, Network Security, Goals of


Security, OSI Security Architecture.

2 Security Attacks, Classes of Threats, Policies, Services & Mechanisms,


Network Security Model

3 Cryptography & basic terminologies, Symmetric Cipher Model,


Classical Ciphers, Ceasar Cipher, HillCipher, Row Transposition
Ciphers, Playfair Ciphier. Quizzes &
Assignments
4 Symmetric Key Cryptography, Feistel Cipher, Data Encryption
Standard basics, rounds,e-box, s-box, p-box, key box.

5 Public Key Cryptography requirements, Deffie-Hellman Key Exchange.

6 RSA Algorithm

7 Chinese Remainder Theorem

8 Needham Schroder, Key Management Distribution, KDC, CRM

9 Digital Signature, Characteristics, MACs, One-way Hash function,


Signing & Verification, Birthday Attack.
Public Key Certificates. Man-in-the-middle

10 Authentication Applications

11 Authorization and Access Control, ACLs Quiz

12 Audit Mechanisms, Intrusion detection, Password Management

13 General principles of system security, IP Security

14 Network-based security issues, operational security issues;


physical security issues.

15 Malicious Software, Physical threats, legal and ethical issues in


computer security

16 Firewalls, Internet Security Policy, Design Goals, Controls, Packet Assignment


Filtering Router, Limitations, Application Level Gateway, Circuit Level
Gateways, Firewall Architecture.

End Term Exam

You might also like