0% found this document useful (0 votes)
7 views

CIS_information_security 2025 Spring batch 2022F UPDATED

The document outlines the course information for 'Information Security' (CS-326T) at Sir Syed University for Spring 2025, detailing objectives, learning outcomes, assessment methods, and a lecture plan. The course covers topics such as cyber threats, cryptography, and network security mechanisms, with a focus on various algorithms and security practices. Recommended textbooks include works by Whitman and Stallings, and the grading policy is based on quizzes, assignments, midterm, and final exams.

Uploaded by

areebsiddiqui121
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

CIS_information_security 2025 Spring batch 2022F UPDATED

The document outlines the course information for 'Information Security' (CS-326T) at Sir Syed University for Spring 2025, detailing objectives, learning outcomes, assessment methods, and a lecture plan. The course covers topics such as cyber threats, cryptography, and network security mechanisms, with a focus on various algorithms and security practices. Recommended textbooks include works by Whitman and Stallings, and the grading policy is based on quizzes, assignments, midterm, and final exams.

Uploaded by

areebsiddiqui121
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

(SSUET/QR/111)

SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY


COMPUTER SCIENCE & INFORMATION TECHNOLOGY
DEPARTMENT
BS Computer Science
COURSE INFORMATION SHEET
Session: Spring-2025
Course Title: Information Security
Course Code: CS-326T
Credit Hours: 3
Semester: 6th
Pre-Requisite: Computer Networks
Instructor Name: Razia Nisar Noorani/Dr. Waleej Haider
Email and Contact Information: [email protected]/[email protected]
WhatsApp Group: IS_Fall2025
Office Hours: Monday & Tuesday(10:00am to 11:30am)
Mode of Teaching: Synchronous/Asynchronous/Hybrid/Blended

COURSE OBJECTIVE:
The objective of this course is to introduce concepts related to cyber threats, cryptography and
Network Security. Different security algorithms and mechanisms will be presented and
solutions to security threats will be discussed.

COURSE OUTLINE:
Introduction to data and network security, goals, threats and attacks, Kill chain models,
Advanced Persistent Threats, Security mechanisms, Difference between Cryptography and
cryptanalysis, Traditional substitution and transposition cipher, Modern symmetric-key
cryptography, Simplified DES, DES design principals, Double DES, Triple DES, Concept of
Block chain with its applications, and Block cipher modes of operation, Raijndael Algorithm,
Mechanism of encryption in AES, Principles of Public Key Cryptosystem, RSA Algorithm,
Diffie-Hellman Key Exchange, Application of cryptographic Hash functions, Secure Hash
Algorithm (SHA), Key management and distribution, Network Security Mechanisms, IPSec,
Virtual Private Network, Firewalls and Intrusion Detection and Prevention Systems

COURSE LEARNING OUTCOMES (CLOs):


Bloom’s
CLO # Course Learning Outcomes (CLOs) PLO Mapping
Taxonomy
Explain security principles (CIA), C2
PLO_9
1 challenges, security goals and professional (Understandi
(Ethics)
practices in cybersecurity. ng)
Apply various algorithms and security PLO_2
C3
2 mechanisms to provide confidentiality, (Knowledge for
(Applying)
integrity, and authentication Computing Problem)
Identify appropriate techniques to PLO_3 C4
3
analyze the problems in the discipline of (Problem Analysis) (Analyzing)
network security..

Page 1 of 4
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER SCIENCE & INFORMATION TECHNOLOGY
DEPARTMENT
BS Computer Science
RELATIONSHIP BETWEEN ASSESSMENT TOOLS AND CLOs:
Assessment Tools CLO1 CLO2 CLO3
Quizzes 3 (7.4%) 3(9.5%) 4 (19%)
Assignments 3 (7.4%) 3(9.5%) 4 (19%)
Mid 15 (29.6%) 15(28.6) -------
Final 10(55.6%) 20(52.4%) 20(62%)
Total 31 (31%) 41 (41%) 28(21%)
GRADING POLICY:
Assessment Tools Percentage Marks
Quizzes 10% 10
Assignments 10% 10
Midterm Exam 30% 30
Final Exam 50% 50
TOTAL 100% 100

Recommended Book:

TEXT BOOK:

 Whitman, M.E. and Mattord, H.J. (2022). Principles of information security. Boston,
Ma: Cengage.
 Stallings, W. (2020). Cryptography and Network Security: Principles and Practice.
Pearson.

REFERENCE BOOKS:

 Christof P., Pelzl J., (2010), Understanding Cryptography: A Textbook for Students
and Practitioners, Springer

LECTURE PLAN
Course Title: Information Security
Course Code: CS-326T
Week Week Required
Topics Key Date
# Dates Reading
Chapter 1: Overview of Information
Security
Orientation (learning objectives,
performance evaluation, etc.)
06-03-2025 What is Information Security?
Whitman Chap 1,
1 To Examples of Information Security Incidents
Pg.: 1-42
07-03-2025 , What is Information Security Management
Human and Management Aspects of
Security measure, The three concepts of
Information Security (Confidentiality,
Integrity, Availability) CIA Triad

Page 2 of 4
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER SCIENCE & INFORMATION TECHNOLOGY
DEPARTMENT
BS Computer Science
Basic terminologies in Information
Security, Human Aspect of Information
Security.

Chapter 2: The Need for Security Whitman Chap


Threats and Attacks 2, Pg: 49-118
Compromises to Intellectual Property
2 Social Engineering
Information Extortion
Software Attacks
Chapter 3: Classical Encryption Techniques Stalling, Ch.-3,
Traditional substitution ciphers Pfleeger, Ch.-2,
(Mono-alphabetic)- Additive Ceasar cipher pg. 71
Mono-alphabetic Ciphers
Vernam Cipher
3 Hill Cipher
Playfair Cipher
Book Cipher
Running Key Cipher
Multiplicative cipher
Affine Ciphers, Playfair, Hill Cipher
Stalling, Ch.-3,
Traditional transposition ciphers Quiz#01
4 Pfleeger, Ch.-2,
Rail fence, simple columnar, etc Assignment
pg. 71
1
Cyber Threats and Kill Chain Methodology
Describe various cyber threats and its
categories
 Understand various threat actors
 Explain about motives, goals, and
objectives of cyber security attacks
Internet Sources
 Explain about various IoCs
( Lecture Notes
5  Understand the pyramid of pain
provided to
Describe APTs
Students)
 Explain the cyber kill chain methodology
 Understand the adversary’s TTPs
 Explain how to identify adversary
behavior
 Understand the kill chain deep dive
scenario
Chapter 4: Introduction to Block Cipher,
fiestal cipher structure,
Stalling, Ch.-5,
6 Simplified DES key generation
pg. 150 Assignment#
Simplified DES encryption, decryption
02

Data encryption standard (DES)


DES design principals & Algorithm, key Stalling, Ch.-5,
7 generation pg. 150
DES Encryption, Decryption
Chapter 6: Advance Encryption Standard
Rijindael Cipher, Finite Field Arithmetic,
AES Structure, AES Transformation Stalling, Ch.-5,
8 Functions, Substitute Bytes function pg. 150
ShiftRows Transformation, AES
MixColumns functions

Page 3 of 4
(SSUET/QR/111)
SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY
COMPUTER SCIENCE & INFORMATION TECHNOLOGY
DEPARTMENT
BS Computer Science
Add Round Key Transformation

Midterm Examination
9
(28-04-2024 to 03-05-2025)

AES Key generation and Expansion Stalling, Ch.-5,


10 Algorithm pg. 150

Concepts of number theory , Principles of


Pseudorandom Number Generation, Stalling, Ch. 4,7,
11 Pseudorandom Number Generators, Linear pg. 103, 226
Congruential Generators
Quiz#02
Chapter 9: Public-key cryptography
Asymmetric Encryption
Stalling,Ch.-9, pg.
12 RSA,
270-308 Assignment#
Blum Blum Shub Generator Stream Ciphers
03
(RC4)
Chapter 10: Other Public Key System
Stalling,Ch.-11,
13 Diffie-Hellman Key Exchange
12 pg.333-400

Chapter 11: Cryptographic Hash Functions,


Stalling,Ch.-
MAC and SHA
13,pg. 403
14 Chapter 13: Digital signatures, Elgamal and
sharmon
RSA and DSS approach
User Public Key Certificate and Public
Key Infrastructure (PKI)
Key Certificate: Digital Signature of Public Stalling,Chap-14,
15 Key pg, 423
Public key Infrastructure (PKI) and Quiz#03
Certificate Authority
Exercise on PKI

Chapter 15: User Authentication Protocol Stalling, Chap-15,


16 Remote User Authentication Principles Pg. 500-524
Kerberos

Internet Sources
State of the art work in network security ( Lecture Notes
17 (Security of IoTs), Project presentations provided to
Students)
Final Examination
(08-07-2025 to 19-07-2025)
Stalling: William Stalling, Whitman: Michael E. Whitman, Pfleeger: Christof P., Pelzl

Page 4 of 4

You might also like