COURSE DESCRIPTION

NAME OF INSTITUTION Lahore Garrison University
PROGRAM (S) TO BE EVALUATED Computer Science , Fall 2022
Course Description : Students should have a good understanding of programming concepts, data structures, Operating System and Algorithms. These prerequisites are covered in any Bachelor degree in Computer Science.
Course Code CSC374
Course Title Information Security
Credit Hours 3
Prerequisites by Course(s) and Topics
Assessment Instruments with Weights (homework, quizzes, midterms, final, programming assignments, lab work, etc.) SESSIONAL (Quizzes, Assignments, Presentations) =25 %
Midterm Exam =25 %
Final Exam = 50%
Course Coordinator Muhammad Arslan Tariq
URL (if any)
Current Catalog Description
Textbook (or Laboratory Manual for Laboratory Courses)
Reference Material
Course Goals
Course Learning Outcomes (CLOs):
At the end of the course the students will be able to:DomainBT Level*
BT= Bloom’s Taxonomy, C=Cognitive domain, P=Psychomotor domain, A= Affective domain
Explain key concepts of information security such as design principles, cryptography, risk management, and ethics C,P 2,2
Discuss legal, ethical, and professional issues in information security A 2
Apply various security and risk management tools for achieving information security and privacy C 3
Identify appropriate techniques to tackle and solve problems in the discipline of information security C 4
* BT= Bloom’s Taxonomy, C=Cognitive domain, P=Psychomotor domain, A= Affective domain
Topics Covered in the Course, with Number of Lectures on Each Topic (assume 15-week instruction and one-hour lectures)
WeekLectureTopics Covered
Week 1 1 Objective and Motivation, Introduction, Course Prerequisites, Course Contents. History of Secure Systems (Source. Wikipedia).
2 Basic Principles
Week 2 3 Authentication Models (Authentication, Authorization, Audit, Access Matrix), ACLs, Capability List
4 Bell­LaPadula Model, RBAC, TBAC
Week 3 5 Security Kernels including History of Kernels Security, OS Protection Principles
6 Secure Communications Processor (Scomp), Scomp Architecture, SCOMP Security Protection Module, Scomp Trusted Operating Program (STOP)
Week 4 7 Cryptography Algorithms (Symmetric vs. Asymmetric Algorithms)
8 Symmetric Algorithms including Data Encryption Standard (DES), 3DES (Triple DES) Blowfish, Two fish
Week 5 9 IDEA (International Data Encryption Algorithm) RC4, RC5, RC6
10 AES (Advanced Encryption Standard), SAFER (Secure and Fast Encryption Routine) Serpent
Week 6 11 Asymmetric Key Algorithms (Diffie-Hellman)
12 El Gamal Elliptic curve cryptosystem (ECC)
Week 7 13 Digital Signature Algorithm (DSA)
14 Revision
Week 8 1 hours Mid Term
Week 9 15 Message Digest (M.D. Algorithms) One way Hash ,Message Authentication Codes , HMAC
16 MD5 Algorithms, HAVAL, Secure Hash Algorithm(SHA)
Week 10 17 Intrusion Detection & Response including Introduction to IDS and IPS, Signature-based, Anomaly-based, Stateful Protocol
18 Stateless Protocol, Network-based, Host-based, Network Behavior Analysis (NBA), Wireless IDPS
Week 11 19 Host and Network Security Requirements, Types of Threats, Interruption, Interception, Modification, Fabrication, Communication Lines and Networks, Active & Passive Attacks
20 User and Data Oriented Access Control, Malicious Programs , Password Learning Techniques, Trapdoor, Logic Bomb, Trojan Horse, Worms, Zombie, Virus Types and Stages (Parasitic, Memory Resident, Boot Sector, Stealth, Polymorphic)
Week 12 21 The “How-Tos” of Physical Protection, Physical Security Components, Layers of Physical Security for Environmental Design and Physical Access, Monitoring Systems, Physical Zoning, Policy Formation
22 Standards and Practices, Enterprise Information Security Policy (EISP).
Week 13 23 Database Security, Database Policy Formulation and Enforcement, Database Administration, Database Policies
24 Prevention of unauthorized access, Intentional or accidental to database, DBMS’s Security Features
Week 14 25 Legal and Social Security Issue including Law and Ethics in Information Security, Relevant U.S. Laws (General), Privacy of Customer Information, U.S. Copyright Law, Freedom of Information Act of 1966 (FOIA),
26 Digital Millennium Copyright Act (DMCA), United Nations Charter
Week 15 27 Association of Computing Machinery (ACM) Code of Ethics
28 Information Systems Audit and Control Association (ISACA)
Week 16 29 Information Systems Security Association (ISSA)
30 Revision
Week 17 2 hours Final Term
Laboratory Projects/Experiments Done in the Course N/A
Programming Assignments Done in the Course Scenario Based Assignment
Instructor Name Muhammad Arslan Tariq
Instructor Signature
Date