Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification



Similar documents
Weighted Total Mark. Weighted Exam Mark

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Network Security Course Specifications

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Curran, K. Tutorials. Independent study (including assessment) N/A

NETWORK ADMINISTRATION AND SECURITY

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Division: Applied Science (AS) Liberal Arts (LA) Workforce Development (WD)

CS 450/650 Fundamentals of Integrated Computer Security

Chapter 23. Database Security. Security Issues. Database Security

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Information Security

Cryptography and network security CNET4523

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

Ursuline College Accelerated Program URSULINE COLLEGE

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

e-code Academy Information Security Diploma Training Discerption

CPSC 467: Cryptography and Computer Security

Chapter 7 Transport-Level Security

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

CIS 253. Network Security

ICOM 5018 Network Security and Cryptography

Content Teaching Academy at James Madison University

CSCI 454/554 Computer and Network Security. Final Exam Review

EECS 588: Computer and Network Security. Introduction January 14, 2014

Course Design Document. IS403: Advanced Information Security and Trust

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

UVic Department of Electrical and Computer Engineering

Implementing Cisco IOS Network Security

Information Security Course Specifications

MS-55096: Securing Data on Microsoft SQL Server 2012

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

VALLIAMMAI ENGINEERING COLLEGE

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

CS Ethical Hacking Spring 2016

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

IINS Implementing Cisco Network Security 3.0 (IINS)

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Network Security SWISS GERMAN UNIVERSITY. Administration Charles Lim

Network Security Essentials:

Securing Data on Microsoft SQL Server 2012

CS 464/564 Networked Systems Security SYLLABUS

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

CSC 474 Information Systems Security

CPSC 467b: Cryptography and Computer Security

Session Development of a Graduate Certificate in Information Assurance

Certificate in Cyber Security

Higher National Unit specification: general information

Chapter 17. Transport-Level Security

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Network Security. Text. Administrative. My Information. Course Focus. Evaluation CEN

CRYPTOGRAPHY AND NETWORK SECURITY

Networking: EC Council Network Security Administrator NSA

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Data Encryption and Network Security

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Bellevue University Cybersecurity Programs & Courses

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

EECS 588: Computer and Network Security. Introduction

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

MS Information Security (MSIS)

Monfort College of Business Semester Course Syllabus ( ) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

Introduction to Cyber Security / Information Security

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Tim Bovles WILEY. Wiley Publishing, Inc.

Networked Systems Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner

Network Security. Outline of the Tutorial

Course Syllabus. Course code: Academic Staff Specifics. Office Number and Location

Information, Network & Cyber Security

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

CRYPTUS DIPLOMA IN IT SECURITY

Diploma in Information Security Control, Audit and Management (CISSP Certification)

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management

Chapter 8. Network Security

Introduction to Computer Security

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Computer Security (EDA263 / DIT 641)

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

Chapter 23. Database Security. Security Issues. Database Security

Transcription:

1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 6. Credit Rating for the module - 4 Credits 7. Prerequisites and co-requisites Information Security 8. Module Summary This course will cover many aspects of computer security including cryptography, network security, application security, and web security. Traditional topics such as buffer overflows, intrusion detection, packet analysis, and malware will be discussed. We will also delve into unorthodox topics including privacy, incident handling, forensics and anti-forensics, legal issues, and security in emerging technologies. This is largely a hands-on course where students will play both offense and defense. 9. Module Aims This course unit is aimed at introducing the technologies and practices that can be used to secure information, computer systems and networks. The course will cover security threats and vulnerabilities, principles of cryptography, and practical topics in network and Internet security. 10. Learning Outcomes By the end of this course, students will be able to: a. State the basic concepts in information security, including security policies, security models, and security mechanisms. b. Explain concepts related to applied cryptography, including plain-text, cipher-text, the four techniques for crypto-analysis, symmetric cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions, and modes of encryption

operations. c. Explain the concepts of malicious code, including virus, Trojan horse, and worms. d. Explain common vulnerabilities in computer programs, including buffer overflow vulnerabilities, time-of-check to time-of-use flaws, incomplete mediation. Outline the requirements and mechanisms for identification and authentication. e. Explain issues about password authentication, including dictionary attacks (password guessing attacks), password management policies, and one-time password mechanisms. f. Discuss network fundamentals and security, including: network topologies, protocols, address conservation, naming, network services, and network threats and countermeasures. Explain the requirements for trusted operating systems, and describe the independent evaluation, including evaluation criteria and evaluation process. g. Describe security requirements for database security, and describe techniques for ensuring database reliability and integrity, secrecy, inference control, and multi-level databases. h. Describe threats to networks, and explain techniques for ensuring network security, including encryption, authentication, firewalls, and intrusion detection. i. Explain the requirements and techniques for security management, including security policies, risk analysis, and physical threats and controls. 11. Syllabus Week 1- Introduction (1 lecture) Basic concepts: threats, vulnerabilities, controls; risk; confidentiality, integrity, availability; security policies, security mechanisms; assurance; prevention, detection, deterrence Week 2- Basic cryptography (1 lecture) Introduction to cryptography, Secret key cryptosystems, Basic cryptographic terms, historical background, symmetric crypto primitives, modes of operation, Week 3-4 Cryptography Techniques/Systems (2 lectures) Encryption systems, transposition systems, substitution systems Week 5 First Exam Week 6-8 Cryptography Algorithms (3 lectures) Symmetric Encryption, Data Encryption Standards (DES), Advanced Encryption Standards (AES), Public Key Encryption, Hash Functions, Key exchange, Digital Signatures

Week 9 Network Security (1 lecture) Network Security Definition, Network threats, Eavesdropping, Modification Week 10-11 Network Security II (2 lectures) Firewalls, Intrusion Detection, Secure e-mail Week12 Second Exam Week 13-14 Network Tool analyzer (2 lectures) Week 15 Authentication (1 lecture) Identification and authentication, Passwords, Biometrics Week 16 - One-time passwords and challenge response schemes, Kerberos Week 17 Third Exam Week 18 - Kerberos, SSL, SSH (1 lecture) Week 19-20 Security in conventional operating systems (2 lectures) Memory, time, file, object protection requirements and techniques Protection in contemporary operating systems Week 21-22 Database management systems security (2 lectures) Database integrity, Database secrecy, Inference control, Multilevel databases Week 23 Forth Exam Week 24-25 Management of security (2 lectures) Security policies, Risk analysis, Physical threats and controls Week 26 Miscellaneous (1 lecture) Legal aspects of security, Privacy and ethics Week 27-28 Ethical Hacking (1 lecture) Ethical hacking process, Hacking Methodology, Scanning Systems Week 29 Fifth Exam Week 30 Web Applications security (1 lecture) Web applications Vulnerabilities, Choosing tools, Insecure Login Mechanisms, Input Filtering, URL filter Bypassing Week 31 Presentation of Project/Report Week 32 Review

12. Assessment Strategy For this course, the instructor will utilize a variety of evaluation tools to measure how well the students are achieving the learning objectives. The table below contains a summary of the components of the final grade. Each element is described in more detail. Item Percentage Quizzes 5 Labs 5 Report/Projects 10 Exam Theory 20 Final Exam Practical 20 Theoretical 40 Quizzes/Labs Quizzes will be given throughout the semester, at a rate of approximately One per chapter. Quizzes will always cover the material covered since the last Quiz or Exam. The quizzes will be combinations of objective and short-answer questions. Report/Project An 8-10 page (2500-3000 words) paper covering a topic chosen by the student will be due on April 23rd. One paragraph describing the topic will be due to the instructors the week of March 5. The paper should examine a topic in a unique and analytic way, rather than provide a summary of the particular field of study. The paper will be graded on both the quality of writing and analysis. Exams: There will be five (5) non-cumulative examinations and a final exam. The content will come from the text and other material presented in lecture sessions as well as labs. Note that material presented in class and in lab will supplement the assigned reading. Therefore, class attendance and good note taking are essential tactics for success 13. Learning Session Structure Every week we have a 1 hour lecture followed by 30 minute tutorial, and 1 ½ hour practical workshop in a computer lab. 15. Learning and Teaching Methods 16. Text Books Required: Applied Cryptography and Network Security, By JaydipSen, InTech,2012 Optional:

Hacking Exposed6:NetworkSecurity Secrets&Solutions, Styart Mc Clure,Joel Scambray, andgeorge Kurtz, McGraw-Hill,2009 Hacking: The Art of Exploitation, 2nd Edition, Jon Erickson, 2008 Introduction to Computer Security, By Matt Bishop, Prentice Hall PTR,2005 17. Validated and Verified by