26-Oct-2022 |
1.5 hours |
Objective and Motivation, Introduction, Course Prerequisites, Course Contents. History of Secure Systems (Source. Wikipedia). |
Intro |
|
|
1.5 hours |
Basic Principles |
(Information Security, Confidentiality Integrity, Availability) |
|
31-Oct-2022 |
1.5 hours |
Authentication Models (Authentication, Authorization, Audit, Access Matrix), ACLs, Capability List |
Authentication, Authorization, Audit, Access Matrix |
|
|
1.5 hours |
BellLaPadula Model, RBAC, TBAC |
RBAC |
|
7-Nov-2022 |
1.5 hours |
Security Kernels including History of Kernels Security, OS Protection Principles |
OS Protection Objects, Trusted OS Concepts |
|
|
1.5 hours |
Secure Communications Processor (Scomp), Scomp Architecture, SCOMP Security Protection Module, Scomp Trusted Operating Program (STOP) |
Scomp Applications |
|
14-Nov-2022 |
1.5 hours |
Cryptography Algorithms (Symmetric vs. Asymmetric Algorithms) |
Symmetric vs. Asymmetric Algorithms |
|
|
1.5 hours |
Symmetric Algorithms including Data Encryption Standard (DES), 3DES (Triple DES) Blowfish, Two fish |
Triple DES |
|
21-Nov-2022 |
1.5 hours |
IDEA (International Data Encryption Algorithm) RC4, RC5, RC6 |
(International Data Encryption Algorithm) |
|
|
1.5 hours |
AES (Advanced Encryption Standard), SAFER (Secure and Fast Encryption Routine) Serpent |
Secure and Fast Encryption Routine |
|
28-Nov-2022 |
1.5 hours |
Asymmetric Key Algorithms (Diffie-Hellman) |
RSA (Rivest-Shamir-Adleman) |
|
|
1.5 hours |
El Gamal Elliptic curve cryptosystem (ECC) |
curve cryptosystem (ECC) |
|
5-Dec-2022 |
1.5 hours |
Digital Signature Algorithm (DSA) |
Merkle-Hellman Knapsack |
|
|
1.5 hours |
Revision |
Revision |
|
19-Dec-2022 |
1 Hour |
Mid Term |
|
|
26-Dec-2022 |
1.5 hours |
Message Digest (M.D. Algorithms) One way Hash ,Message Authentication Codes , HMAC |
Symmetric Keys, MD 2, MD 4 |
|
|
1.5 hours |
MD5 Algorithms, HAVAL, Secure Hash Algorithm(SHA) |
SHA-1, SHA-256, SHA 384, SHA-512 |
|
2-Jan-2023 |
1.5 hours |
Intrusion Detection & Response including Introduction to IDS and IPS, Signature-based, Anomaly-based, Stateful Protocol |
Stateful Protocol |
|
|
1.5 hours |
Stateless Protocol, Network-based, Host-based, Network Behavior Analysis (NBA), Wireless IDPS |
IDPS Evaluation |
|
9-Jan-2023 |
1.5 hours |
Host and Network Security Requirements, Types of Threats, Interruption, Interception, Modification, Fabrication, Communication Lines and Networks, Active & Passive Attacks |
Object Protection, Protection of Memory |
|
|
1.5 hours |
User and Data Oriented Access Control, Malicious Programs , Password Learning Techniques, Trapdoor, Logic Bomb, Trojan Horse, Worms, Zombie, Virus Types and Stages (Parasitic, Memory Resident, Boot Sector, Stealth, Polymorphic) |
Parasitic, Memory Resident, Boot Sector, Stealth, Polymorphic |
|
16-Jan-2023 |
1.5 hours |
The “How-Tos” of Physical Protection, Physical Security Components, Layers of Physical Security for Environmental Design and Physical Access, Monitoring Systems, Physical Zoning, Policy Formation |
Enforcement including Information Security Policy |
|
|
1.5 hours |
Standards and Practices, Enterprise Information Security Policy (EISP). |
Policy Management, Military Security Policy, Commercial Security Policies, Clark-Wilson Commercial Security Policy, Chinese Wall Security Policy, Network Architecture for Automatic Security and Policy Enforcement |
|
23-Jan-2023 |
1.5 hours |
Database Security, Database Policy Formulation and Enforcement, Database Administration, Database Policies |
Access Privilege Policies |
|
|
1.5 hours |
Prevention of unauthorized access, Intentional or accidental to database, DBMS’s Security Features |
Disaster Planning, Archiving |
|
30-Jan-2023 |
1.5 hours |
Legal and Social Security Issue including Law and Ethics in Information Security, Relevant U.S. Laws (General), Privacy of Customer Information, U.S. Copyright Law, Freedom of Information Act of 1966 (FOIA), |
International Laws and Legal Bodies |
|
|
1.5 hours |
Digital Millennium Copyright Act (DMCA), United Nations Charter |
Policy Versus Law |
|
6-Feb-2023 |
1.5 hours |
Association of Computing Machinery (ACM) Code of Ethics |
Association of Computing Machinery (ACM) Code of Ethics |
|
|
1.5 hours |
Information Systems Audit and Control Association (ISACA) |
Information Systems Audit and Control Association (ISACA) |
|
15-Feb-2023 |
1.5 hours |
Information Systems Security Association (ISSA) |
Information Systems Security Association (ISSA) |
|
|
1.5 hours |
Revision |
Revision |
|
20-Feb-2023 |
2 Hour |
Final Term |
|
|