Week 1 |
1 |
Objective and Motivation, Introduction, |
|
2 |
Course Contents. History of Secure Systems |
Week 2 |
3 |
Basic Principles (Information Security, Confidentiality Integrity, Availability). |
|
4 |
Authentication Models (Authentication, Authorization), |
Week 3 |
5 |
Access Control Models ( MAC, DAC, RBAC, TBAC), Formal Security Models |
|
6 |
Security Kernels including History of Kernels Security, OS Protection Principles, OS Protection Objects, Trusted OS Concepts |
Week 4 |
7 |
Cryptography Algorithms (Symmetric vs. Asymmetric Algorithms) |
|
8 |
Digital Signature, CAs |
Week 5 |
9 |
Symmetric Algorithms including Data Encryption Standard (DES) |
|
10 |
3DES (Triple DES) Blowfish, Two fish |
Week 6 |
11 |
IDEA (International Data Encryption Algorithm) |
|
12 |
RC4, RC5, RC6 |
Week 7 |
13 |
AES (Advanced Encryption Standard) |
|
14 |
Asymmetric Key Algorithms (Diffie- Hellman), RSA (Rivest-Shamir-Adleman) |
Week 8 |
1 hours |
Mid Term |
Week 9 |
15 |
El Gamal Elliptic curve cryptosystem (ECC) |
|
16 |
Digital Signature Algorithm (DSA), Merkle-Hellman Knapsack |
Week 10 |
17 |
Message Digest (M.D. Algorithms) One way Hash, Message Authentication Codes |
|
18 |
Secure Hash Algorithm (SHA) SHA-1, SHA-256, SHA 384, SHA-512 |
Week 11 |
19 |
Stateless Protocol, Network-based, Host- based, Network Behavior Analysis (NBA), Wireless IDPS, IDPS Evaluation |
|
20 |
Host and Network Security Requirements, Types of Threats, Interruption |
Week 12 |
21 |
Host and Network Security Requirements |
|
22 |
Policy Formation and Enforcement including Information Security Policy Standards and Practices |
Week 13 |
23 |
Policy Management, Military Security Policy, Commercial Security Policies, |
|
24 |
Software Security Issues, Handling program input safely, Writing safe program code, Interacting with O/S and other programs, Handling program output |
Week 14 |
25 |
Database Security, Database Policy Formulation and Enforcement, Database Administration, Database Policies, Access Privilege Policies |
|
26 |
Prevention of unauthorized access, Intentional or accidental to database |
Week 15 |
27 |
Legal and Social Security Issue including Law and Ethics in Information Security, Relevant U.S. Laws (General), Privacy of Customer Information |
|
28 |
Digital Millennium Copyright Act (DMCA), United Nations Charter, Policy Versus Law |
Week 16 |
29 |
Information Security and Human Aspects (Social Engineering) |
|
30 |
Students Presentation |
Week 17 |
2 hours |
Final Term |