0% found this document useful (0 votes)
200 views6 pages

Information Security Course CS-324 Outline

The document outlines the course CS-324: Information Security at the University of Gujrat, detailing its objectives, learning outcomes, and grading policy. It includes a sixteen-week plan covering various topics such as risk management, legal issues, and cryptography. The course aims to provide students with a comprehensive understanding of information security management principles applicable in business contexts.

Uploaded by

ayeshagulzar5140
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
200 views6 pages

Information Security Course CS-324 Outline

The document outlines the course CS-324: Information Security at the University of Gujrat, detailing its objectives, learning outcomes, and grading policy. It includes a sixteen-week plan covering various topics such as risk management, legal issues, and cryptography. The course aims to provide students with a comprehensive understanding of information security management principles applicable in business contexts.

Uploaded by

ayeshagulzar5140
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

UNIVERSITY OF GUJRAT

Course Outline

Course Code: CS-324 Course Description: Information Security


BOS Meeting Date: BOS Meeting Count:
Status: Active Is Lock: Un-Locked
Course Outline:

Sixteen Week Plan


Department of Computer Science
Faculty of Computing & Information Technology
Hafiz Hayat Campus, University of Gujrat
Title
Information Security
Code
CS-324
Credit hours
3.0
Prerequisite
Nil
Category
CS-Core
Course Description
--
Aims & Objectives
• The course will provide the student with an understanding of the principles of information security
management that are commonly used in business.
• It will introduce the student to commonly used frameworks and methods and explore critically the
suitability and appropriateness of these for addressing today's organizational security needs.
Learning Outcomes
• The successful participant will:
• have an understanding of the key themes and principles of information security management and be able to
apply these principles in designing solutions to managing security risks effectively;
• understand how to apply the principles of information security management in a variety of contexts;
• have an appreciation of the interrelationship between the various elements of information security
management and its role in protecting organizations.
Text Book A- M. Whitman and H. Mattord, “Principles of information security” Boston, Mass.: Thomson
Course Technology, 2003
Reference Books
&
Material
• Computer Security: Principles and Practice, 3rd edition by William Stallings
• Computer Security, 3rd edition by Dieter Gollmann
• Computer Security Fundamentals, 3rd edition by William Easttom
B- Official (ISC)2 Guide to the CISSP CBK, 3rd edition
Lecture Slides Provided by Instructor
Grading Breakup and Policy
Assignment/ Presentation (s): 10% Quizzes: 5%
Project: 10% Midterm Examination: 25% Final Examination: 50%
Week#
Lecture #
TOPICS
Source
(Book, Chapter No)
Recommendations
for Learning
Activities
(Mention Assignments, Test, Case Study, Projects, Lab Work or Reading Assignments)
1
1
CHAPTER 1
? Introduction to Information Security
? The History of Information security
? Key Information Security Concepts
? Critical Characteristics of Information
? CNSS Security Model
? Components of an Information System
? Balancing Information Security and Access
? Approaches to Information Security Implementation
CH-1 – Book A
2
? Security Professionals and the Organization
? Communities of Interest
? Information Security: Is it an Art or a Science?
? Case Exercises
CH-1 – Book A
2
3
CHAPTER 2
• The Need for Security
? Threats
? Compromises to Intellectual Property
? Deliberate Software Attacks
? Deviations in Quality of Service.
? Espionage or Trespass
? Forces of Nature
CH-2 – Book A
4
? Human Error or Failure
? Information Extortion.
? Missing, Inadequate, or Incomplete Organizational Policy or Planning
? Missing, Inadequate, or Incomplete Controls
? Sabotage or Vandalism
? Theft
? Technical Hardware Failures or Errors
? Technical Software Failures or Errors.
? Technological Obsolescence
CH-2 – Book A
3
5
? Attacks
? Malicious Code
? Hoaxes
? Back Doors
? Password crack
? Brute Force
? Dictionary
CH-2– Book A
Assignment 1
? Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)
? Spoofing
? Man-in-the-Middle
? Spam.
? Mail Bombing
? Sniffers
? Social Engineering
? Pharming
? Timing Attack
6
CHAPTER 3
• Legal, Ethical, and Professional Issues in Information Security
• Law and Ethics in Information Security.
• International Laws and Legal Bodies
• Pakistan Cyber Crime Law
CH-3– Book A
Quiz 1
4
7
• Ethics and Information Security
• Codes of Ethics and Professional Organizations
CH-3– Book A
8
CHAPTER 4
• Risk Management
• An Overview of Risk Management
• Risk Identification
• Risk Assessment
CH-4– Book A
5
9
• Risk Control Strategies
• Risk Assessment
Ch-4 – Book A
10
? Risk Management discussion Points
? Quantitative Versus Qualitative Risk Control Practices
CH-4 Book A
6
11
? Security technology
? Intrusion Detection
? Prevention Systems
? Why Use an IDPS?
? Types of IDPS
? Strengths and Limitations of IDPSs
? Measuring the Effectiveness of IDPSs
CH-6-7 Book A
Assignment 2
12
? Honeypots, Honeynets, and Padded Cell Systems
? Scanning and Analysis Tools
? Operating System Detection Tools
?
Quiz 2
7
13
? Port Scanners
? Firewall Analysis Tools
? Packet Sniffers
? Wireless Security Tools
14
• Biometric Access Controls. .
• Acceptability of Biometrics
8
15
Revision
16
Midterm Exam
9
17
CHAPTER 8
? Cryptography
? Cipher Methods
? Substitution Cipher
? Transposition Cipher
? Exclusive OR.
? Vernam Cipher
? Book or Running Key Cipher
? Hash Functions
CH-8– Book A
18
? Cryptographic Algorithms.
? Symmetric Encryption
? Asymmetric Encryption
? Examples.
? Encryption Key Size
CH-8 – Book A
10
19
? Cryptographic Tools
? Public-Key Infrastructure (PKI)
? Digital Signatures
? Digital Certificates
? Hybrid Cryptography Systems.
? Steganography
CH-8- – Book A
20
• DES
Notes
11
21
? Protocols for Secure Communications
? Securing Internet Communication with S-HTTP and SSL.
? Securing E-mail with S/MIME, PEM, and PGP.
CH-8 – Book A
22
? Securing Web Transactions with SET, SSL, and S-HTTP.
? Securing Wireless Networks with WEP and WPA
? Securing TCP/IP with IPSec and PGP.
CH-8 – Book A
12
23
? IP Security
? Internetworking and Internet Protocol
? IP Security Overview
? IPSec Services
?
CH-8 – Book A
Quiz 3
24
? Attacks on Cryptosystems.
? Man-in-the-Middle Attack.
? Correlation Attacks
? Dictionary Attacks
? Timing Attacks
? Defending Against Attacks
CH-9 – Book A + Notes
Assignment 3
13
25
? Physical Access Controls
? Physical Security Controls
? Fire Security and Safety
? Fire Detection and Response
? Failure of Supporting Utilities and Structural Collapse
? Heating, Ventilation, and Air Conditioning
? Power Management and Conditioning
? Water Problems
? Structural Collapse
? Maintenance of Facility Systems
CH-9 – Book A + Notes
26
? Mobile and Portable Systems.
? Remote Computing Security.
? Special Considerations for Physical Security
? Inventory Management. .
? key physical security considerations
Notes
Quiz 4
14
27
? Firewalls
Notes
Assignment 4
28
? firewalls
Notes
15
29
? IDs
Notes
30
? Law, investigations and ethics
Notes
16
31
? Presentations
Final Presentation
32
? Discussion
? Critical Discussion and Review of Content Studied
Discussion
Final Exam

You might also like