0% found this document useful (0 votes)
3 views

Course-Outline - Information Security

This document outlines an information security course including its description, goals, objectives, teaching strategies and assessment. The course provides a survey of cryptography and network security principles and practices over one semester divided into three main goals covering foundational cryptosystems, public key encryption and information security applications.

Uploaded by

Mohammad Fouzan
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Course-Outline - Information Security

This document outlines an information security course including its description, goals, objectives, teaching strategies and assessment. The course provides a survey of cryptography and network security principles and practices over one semester divided into three main goals covering foundational cryptosystems, public key encryption and information security applications.

Uploaded by

Mohammad Fouzan
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Course Outline – Information Security

GC University Lahore
Department of Computer Science

Course Title: Information Security


Course Code: CS 4215
Course Duration: One Semester (16 weeks of study)
Credit Hour: 3
Course Instructor: Mr. Yahya Khurram/Ms Ayesha Atta

Course Description: This course provides a survey of both the principles and practice of
cryptography and network security. The course covers the importance of securing
information in computer systems and their interconnections via networks. Its aim is to
provide awareness and in-depth knowledge of various technologies to protect data and
resources from disclosure, to guarantee the authenticity of data and messages.

Pre-Requisite: Data and Communication Networks


Course Co-Requisite: None

Course Goals & Objective


Goal No.1: Explain and describes foundations of cryptosystems both classical and
modern. Describe different key distribution techniques.

Obj No.01: Explain techniques for ensuring the secrecy and/or authenticity
of information.
Obj No.02: Study of classical cryptosystems and their cryptanalysis
techniques
Obj No.03: Give examples of various implemented cipher algorithms.
Obj No.04: State the basic properties selecting and computing secret/shared
keys and discussing their constraints.
Obj No.05: Comprehensively address message authentication and key
management.
Obj No. 06: Analyze the placement of encryption function and Traffic
confidentiality.
Obj No. 07: Explain different key distribution techniques such as public key
directory, public key authority and public certificates.

Goal No.2: Explain the core concepts of Public key encryption, Hash functions and
Digital Signatures.

Obj No.01: Explain the basic concepts of number theory involved in


defining public and private keys.
Obj No. 02: Give an in-depth overview on the principles of public key
cryptosystems.
Obj No. 03: To explain CIA and the requirements of authentication. To
discuss the various authentication functions used.
Obj No. 04: Describe the Message Authentication Codes and their security.
Obj No. 05: Describe Hash Functions and their collision properties. What is
the significance of avalanche effect in hash functions?
Obj No. 06: To explain Digital signature and their significance. Describe
various Authentication protocols and Digital Signature
Standard.

Department of Computer Science - GCU 1


Course Outline – Information Security
Goal No.3: Explain & describe the core concepts and practical implementation of
Information Security Applications to make network components secure.

Obj No.01: Describe the concept of attacks, threats, vulnerabilities and


assets. Discuss host based & network based security issues.
Obj No.02: Discuss the operations security issues, physical security issues
and personal security issues.
Obj No.03: To explain the policy formation and enforcement.
Obj No.04: To explain access control, information flow, legal and social
issues.
Obj No.05: Discussing the identification and authentication in local and
distributed systems.
Obj No.06: To discuss the database security and Risk assessment.
Obj No.07: Describe the classification and trust modeling.

Teaching & Learning Strategies

The course will be taught by a combination of lectures, presentations and directed reading.
Unannounced quizzes will be taken during the lectures. All lectures may comprise of a power
point presentation and white board demonstrations. The students will be given the
assignments related to the topic covered during the lecture. The students will be given
research papers to review and will be encouraged to write conference and journal papers.
Lecture Duration will be of 90 Minutes.

Time Management Matrix

 Goal No.1 31% 5 Weeks


 Goal No.2 31% 5 Weeks
 Goal No.3 38% 6 Weeks

Assessment Strategy

 Semester Work (Assignments +Quizzes) : 20 %


 Mid Term: 20%
 Final Term: 60%

Evaluation is based on how well the student will perform in class, assignments and quizzes.
Performance will be monitored throughout the semester. The examination will test the
student’s understanding of the various concepts discussed during the course.
The written examination requires students to complete a theoretical paper covering all aspects
of the course.

Recommended Text Books


1. Cryptography and Network Security by William Stallings 6th Edition 2012.
2. Computer Security: Art and Science by Matth Bishop 2nd Edition
ISBN: 0-321-24744-2
3. Principles of Information Security by Michael E. Whitman and Herbert J. Mattord 4 th
Edition ISBN: 978-1-111-13821-9

Department of Computer Science - GCU 2

You might also like