COURSE LOG

NAME OF INSTITUTION Lahore Garrison University
PROGRAM (S) TO BE EVALUATED Computer Science
Course Name Information Security
Catalog Number
Instructor Name Muhammad Arslan Tariq
WeekDurationTopics Covered Evaluation Instruments UsedSignature
26-Oct-2022 1.5 hours Objective and Motivation, Introduction, Course Prerequisites, Course Contents. History of Secure Systems (Source. Wikipedia). Intro
1.5 hours Basic Principles (Information Security, Confidentiality Integrity, Availability)
31-Oct-2022 1.5 hours Authentication Models (Authentication, Authorization, Audit, Access Matrix), ACLs, Capability List Authentication, Authorization, Audit, Access Matrix
1.5 hours Bell­LaPadula Model, RBAC, TBAC RBAC
7-Nov-2022 1.5 hours Security Kernels including History of Kernels Security, OS Protection Principles OS Protection Objects, Trusted OS Concepts
1.5 hours Secure Communications Processor (Scomp), Scomp Architecture, SCOMP Security Protection Module, Scomp Trusted Operating Program (STOP) Scomp Applications
14-Nov-2022 1.5 hours Cryptography Algorithms (Symmetric vs. Asymmetric Algorithms) Symmetric vs. Asymmetric Algorithms
1.5 hours Symmetric Algorithms including Data Encryption Standard (DES), 3DES (Triple DES) Blowfish, Two fish Triple DES
21-Nov-2022 1.5 hours IDEA (International Data Encryption Algorithm) RC4, RC5, RC6 (International Data Encryption Algorithm)
1.5 hours AES (Advanced Encryption Standard), SAFER (Secure and Fast Encryption Routine) Serpent Secure and Fast Encryption Routine
28-Nov-2022 1.5 hours Asymmetric Key Algorithms (Diffie-Hellman) RSA (Rivest-Shamir-Adleman)
1.5 hours El Gamal Elliptic curve cryptosystem (ECC) curve cryptosystem (ECC)
5-Dec-2022 1.5 hours Digital Signature Algorithm (DSA) Merkle-Hellman Knapsack
1.5 hours Revision Revision
19-Dec-2022 1 Hour Mid Term
26-Dec-2022 1.5 hours Message Digest (M.D. Algorithms) One way Hash ,Message Authentication Codes , HMAC Symmetric Keys, MD 2, MD 4
1.5 hours MD5 Algorithms, HAVAL, Secure Hash Algorithm(SHA) SHA-1, SHA-256, SHA 384, SHA-512
2-Jan-2023 1.5 hours Intrusion Detection & Response including Introduction to IDS and IPS, Signature-based, Anomaly-based, Stateful Protocol Stateful Protocol
1.5 hours Stateless Protocol, Network-based, Host-based, Network Behavior Analysis (NBA), Wireless IDPS IDPS Evaluation
9-Jan-2023 1.5 hours Host and Network Security Requirements, Types of Threats, Interruption, Interception, Modification, Fabrication, Communication Lines and Networks, Active & Passive Attacks Object Protection, Protection of Memory
1.5 hours User and Data Oriented Access Control, Malicious Programs , Password Learning Techniques, Trapdoor, Logic Bomb, Trojan Horse, Worms, Zombie, Virus Types and Stages (Parasitic, Memory Resident, Boot Sector, Stealth, Polymorphic) Parasitic, Memory Resident, Boot Sector, Stealth, Polymorphic
16-Jan-2023 1.5 hours The “How-Tos” of Physical Protection, Physical Security Components, Layers of Physical Security for Environmental Design and Physical Access, Monitoring Systems, Physical Zoning, Policy Formation Enforcement including Information Security Policy
1.5 hours Standards and Practices, Enterprise Information Security Policy (EISP). Policy Management, Military Security Policy, Commercial Security Policies, Clark-Wilson Commercial Security Policy, Chinese Wall Security Policy, Network Architecture for Automatic Security and Policy Enforcement
23-Jan-2023 1.5 hours Database Security, Database Policy Formulation and Enforcement, Database Administration, Database Policies Access Privilege Policies
1.5 hours Prevention of unauthorized access, Intentional or accidental to database, DBMS’s Security Features Disaster Planning, Archiving
30-Jan-2023 1.5 hours Legal and Social Security Issue including Law and Ethics in Information Security, Relevant U.S. Laws (General), Privacy of Customer Information, U.S. Copyright Law, Freedom of Information Act of 1966 (FOIA), International Laws and Legal Bodies
1.5 hours Digital Millennium Copyright Act (DMCA), United Nations Charter Policy Versus Law
6-Feb-2023 1.5 hours Association of Computing Machinery (ACM) Code of Ethics Association of Computing Machinery (ACM) Code of Ethics
1.5 hours Information Systems Audit and Control Association (ISACA) Information Systems Audit and Control Association (ISACA)
15-Feb-2023 1.5 hours Information Systems Security Association (ISSA) Information Systems Security Association (ISSA)
1.5 hours Revision Revision
20-Feb-2023 2 Hour Final Term
Instructor Name Muhammad Arslan Tariq
Instructor Signature
Date