Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Al-Isra Private University Faculty of Science and Information Technology Department of CS Course Plan ___________________________________________________________________________________ Course No.: 601320 Course Name: Information Security Course Website: 1 Course Classification: Department Compulsory (CIS) Time Division: 3 Lectures Semester & Year: Course Description: (3 credit hours, Prerequisite: 604235/ Probability and Statistics) Information security basics, classical encryption and block ciphers, modern symmetric ciphers, confidentiality using symmetric ciphers, public-key cryptosystems and key management, message authentication and hash, digital signatures, IP and Web security, firewalls and trusted systems, software threats (Viruses, Worms). Course Intended Outcomes: At the end of the course, students are expected to learn: - Information systems security issues. - Planning and administration of a secure computer systems - Different methods of encryption and decryption of information - Internet security related issues. Course Outline Week starts on 1 2 Sun Class (Text Sec.) Tue Class (Text Sec.) Thu Class (Text Sec.) Course outline description Chapter 1: Introduction to - Security services, (1.3) Computer Security, (1.1) - Security Attacks (1.2) - A Model for Network & - Cryptographic System (Data - A Model for Access control Network Access Security,(1.4) security), Cryptanalysis, (1.4) Security, (1.4) 3 Chapter 2:Classical encryption Techniques; classification (2.1) - Symmetric Cipher Model, - Caeser Cipher, (2.3). - substitution Techniques (2.2) - Monoalphabetic Cipher 4 - Play Fair Cipher, (2.3) - Polyalphabet Cipher (Vigenere Cipher) - Matrix transposition.. - Code Book - Hill Cipher Transposition Techniques: - Rail Fence. - Skytale Cipher. - Bit Manipulation Cipher. Chapter 3: Modern Encryption Techniques; S-DES, (3.1, 3.2 , 5 3.3) 6 - DES Encryption - Simple DES 7 - Review. - Chapter 4; Public Key Cryptography, Public Key Principle, Cryptosystems, (6.1) 8 - Symmetric Versus Public key Encryption. - Essential Elements of Public key Encryption. - S-DES Relationship to DES - Block cipher Principles. First Exam. -Applications for Public key Encryption. -RSA Algorithm, Design & Examples. - More international algorithms: 3DES, Blowfish, RC5, IDEA. - Return of exam papers and Discussion of Exam Results - Public Key Principle, Cryptosystems, (6.2, 6.3 - Mini RSA. - Security of RSA Al-Isra Private University Faculty of Science and Information Technology Department of CS Course Plan ___________________________________________________________________________________ Chapter 5: Message - Message Authentication and Authentication and Hash Requirements. Technologies (8.1, 8.2, 8.3, - Authentication Functions. 8.4, 8.4, 8.5) - Message Auth. Code (MAC) -Digital Signature and Chapter 6: Access Control; Authentication Protocols ( - System Access Control. 10.1, 10.2 , 10.3) - Hints for protecting - Digital Signature Standard passwords. 9 10 11 - IP Security ( 13.1) - Review 12 - IP Security Architecture (13.2) 13 - 14 Second Exam Viruses and Worms (15.2) Viruses and Related Threats Viruses and Worms(15.2) Viruses and Related Threats 15 - Web Security ( 14.1, 14.2, 14.3) - Web Security requirements Third Exam Firewalls (16.1) - Firewall Design Principles Hash Functions Security of Hash Functions and MACs - Access Control, Data Access, Discretionary Access Control, DAC. - File Protection. - Self/Group/Public Control. - Return of exam papers and Discussion of Exam Results -IP Security Overview - Secure Socket Layer and - Transport Layer Security - Secure E- Transaction - Viruses and Worms(15.2) - Viruses and Related Threats Firewalls -Trusted Systems (16.2) Final Exam Textbook - Cryptography and Network Security, principles and practice, 6th, 2007, William Stallings. Suggested references 1. 2. 3. 4. 5. 6. 7. 8. Computer security Basics, Deborah Russell and G.T.Gangemi,1992. Information security and Cryptography, Kwangio Kim, 2002. Introduction to cryptography principles and applications, Springer, 2002. Cryptography and Network Security, Atul Kahate, 2003. Information Security, Agnes Hui Chan, 2002. Information Security handbook, John M.D. Hunter, 2002. Practical guide to Computer Security, Donald L Pipkin,2003. Network Security: a practice guide, Owen poole,2003 Marking First Exam Second Exam Activity Final Exam 25 marks 25 marks 10 marks 40 marks Regulations 1. 2. 3. 4. 2 There will be three term exams given during this semester. The best two out of three will be considered for the First and Second Exam. This means: there will be NO makeup exams! Missing one of the two left exams means a ZERO grade will be given for that exam. There will NOT be any makeup for quizzes Attendance is mandatory and University regulations will be enforced. All Cheating incidents will be reported to the chair. The following activities are considered cheating: a. Turning in assignment that includes parts of someone else's work. Al-Isra Private University Faculty of Science and Information Technology Department of CS Course Plan ___________________________________________________________________________________ b. Turning in someone else’s assignment as your own. c. Giving assignment to someone else to turn in as their own. d. Copying answers in a test or quiz. e. Taking a test or quiz for someone else. f. Having someone else take a test or quiz for you. 3 5. See Student handbook for other regulations. Assignments and/or Projects Assignments / Description Projects H.W.1 Encryption/ Decryption Using S-DES, Vigenere ciphers H.W.2 Encryption Using RSA , Diffie-Helman ciphers Quizzes Four or more quizzes Due Date Marking TBA 2 MARK TBA 2 MARK TBA 6 MARK Emailing Guidelines: 1. 2. 3. 4. All homework, assignments, projects, etc., are sent by email to the email address shown below ( under Instructor’s Information). Be sure to send them before the due date. Fill in the subject field of the email using the following format: CS301_Family-Name_First-Name_Subject , where: a) CS301 is abbreviation for the course. Other courses should have similar abbreviations b) Family-Name and First-Name are replaced by your family name and your first name. c) Subject is replaced by the title of the assignment, project, etc. You may also use the email to ask questions about the course. In this case, just type the world “question” in the place of _Subject as described in 3-c above. Instructors' information Section: 1 Lecture Room: 4139 Instructor's Name: Dr. Hamza Abbass Alsewadi Email : [email protected] Office Hours: Time: 9:00-10:00 (Sun, Tue, Thu) Office No.: 4111 10:00-11:00] Sun., [12:00-1:00] Tue., [1:00-2:00] Thu. [9:30-11:00] Mon. and [12:30-2:00] Wed. Other office hours are available by appointment Important: The content of this syllabus may not be changed during the current semester. Instructor Council Chair