CIS_information_security 2025 Spring batch 2022F UPDATED
CIS_information_security 2025 Spring batch 2022F UPDATED
COURSE OBJECTIVE:
The objective of this course is to introduce concepts related to cyber threats, cryptography and
Network Security. Different security algorithms and mechanisms will be presented and
solutions to security threats will be discussed.
COURSE OUTLINE:
Introduction to data and network security, goals, threats and attacks, Kill chain models,
Advanced Persistent Threats, Security mechanisms, Difference between Cryptography and
cryptanalysis, Traditional substitution and transposition cipher, Modern symmetric-key
cryptography, Simplified DES, DES design principals, Double DES, Triple DES, Concept of
Block chain with its applications, and Block cipher modes of operation, Raijndael Algorithm,
Mechanism of encryption in AES, Principles of Public Key Cryptosystem, RSA Algorithm,
Diffie-Hellman Key Exchange, Application of cryptographic Hash functions, Secure Hash
Algorithm (SHA), Key management and distribution, Network Security Mechanisms, IPSec,
Virtual Private Network, Firewalls and Intrusion Detection and Prevention Systems
Page 1 of 4
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER SCIENCE & INFORMATION TECHNOLOGY
DEPARTMENT
BS Computer Science
RELATIONSHIP BETWEEN ASSESSMENT TOOLS AND CLOs:
Assessment Tools CLO1 CLO2 CLO3
Quizzes 3 (7.4%) 3(9.5%) 4 (19%)
Assignments 3 (7.4%) 3(9.5%) 4 (19%)
Mid 15 (29.6%) 15(28.6) -------
Final 10(55.6%) 20(52.4%) 20(62%)
Total 31 (31%) 41 (41%) 28(21%)
GRADING POLICY:
Assessment Tools Percentage Marks
Quizzes 10% 10
Assignments 10% 10
Midterm Exam 30% 30
Final Exam 50% 50
TOTAL 100% 100
Recommended Book:
TEXT BOOK:
Whitman, M.E. and Mattord, H.J. (2022). Principles of information security. Boston,
Ma: Cengage.
Stallings, W. (2020). Cryptography and Network Security: Principles and Practice.
Pearson.
REFERENCE BOOKS:
Christof P., Pelzl J., (2010), Understanding Cryptography: A Textbook for Students
and Practitioners, Springer
LECTURE PLAN
Course Title: Information Security
Course Code: CS-326T
Week Week Required
Topics Key Date
# Dates Reading
Chapter 1: Overview of Information
Security
Orientation (learning objectives,
performance evaluation, etc.)
06-03-2025 What is Information Security?
Whitman Chap 1,
1 To Examples of Information Security Incidents
Pg.: 1-42
07-03-2025 , What is Information Security Management
Human and Management Aspects of
Security measure, The three concepts of
Information Security (Confidentiality,
Integrity, Availability) CIA Triad
Page 2 of 4
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER SCIENCE & INFORMATION TECHNOLOGY
DEPARTMENT
BS Computer Science
Basic terminologies in Information
Security, Human Aspect of Information
Security.
Page 3 of 4
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER SCIENCE & INFORMATION TECHNOLOGY
DEPARTMENT
BS Computer Science
Add Round Key Transformation
Midterm Examination
9
(28-04-2024 to 03-05-2025)
Internet Sources
State of the art work in network security ( Lecture Notes
17 (Security of IoTs), Project presentations provided to
Students)
Final Examination
(08-07-2025 to 19-07-2025)
Stalling: William Stalling, Whitman: Michael E. Whitman, Pfleeger: Christof P., Pelzl
Page 4 of 4