1932322Information Security and Privacy

advertisement
The University of Jordan
Accreditation & Quality Assurance Center
COURSE Syllabus
4
5
6
7
8
9
Course title
Course number
Credit hours (theory, practical)
Contact hours (theory, practical)
Prerequisites/co requisites
Program title
Program code
Awarding institution
Faculty
Department
Information Security and Privacy
1932322
3
3
Introduction to Database Systems (1902223)
Computer Information Systems
2
The University of Jordan
King Abdullah II school for IT
Computer Information Systems
10
Level of course
Third year
11
12
Year of study and semester (s)
Final Qualification
Other department (s) involved in
teaching the course
2014/2015 Second Semester
B.Sc.
14
Language of Instruction
English
15
16
Date of production/revision
Required/ Elective
5/2015
Required
1
2
3
13
-
17. Course Coordinator:
Loai Alnemer
Office Hours: Sun- Wed 9-10,
Phone Number: 22613
E-mail: l.nemer@ju.edu.jo
18. Other instructors:
Office numbers, office hours, phone numbers, and email addresses should be listed.
19. Course Description:
As stated in the approved study plan.
Identify a range of methods, techniques and current issues of security and privacy problems
associated with the use of CISs; Cryptology: Encryption and decryption, Steganography, Security models,
Ways to minimize risks and losses, Apply the information security methods and management to the
development and management of information system security within an organization, User Identification /
Authentication, Digital Signature, Applications.
20. Course aims and outcomes:
A- Aims:
B- Intended Learning Outcomes (ILOs): Upon successful completion of this course students will be able to
…
A1) Understand the meaning of information security.
A2) Understand security threats, Security models, and building security functions.
A3) Understand the Public key cryptography schema.
A4) Understand the private key cryptography schema.
A5) Understand the cryptographic hash functions.
A6) Understand the steganography, watermarking and information hiding.
A7) Understand database security
B1) Distinguish between different security models.
B2) Distinguish between public key and private key cryptography
B3) Explain some classical encryption methods.
B4) Explain the Hash functions, cryptographic hash functions with applied examples.
B5) Distinguish between different information hiding schema.
C- Subject specific skills- with ability to …
C1) analyze simple mathematical formulae.
C2) Analyze some computational aspects related to public cryptography schema.
C3) Analyze some computational aspects related to Private cryptography schema.
21. Topic Outline and Schedule:
Topic
Week
Instructor
Achieved
ILOs
Evaluation
Methods
Overview
Introduction to
data security,
attacks, services,
Security models,
Cryptology, and
digital signature
1,2
Loai Alnemer
A1,A2,B1
Homework
Reference
chapter 1
Cryptology
Introduction to
Cryptology
Privacy,
authenticity and
integrity Keys
Background on
functions and
Number Theory
Symmetric
Ciphers
Symmetric
cipher model,
Caesar cipher,
Monoalphabatic
cipher,
Polyalphabatic
cipher, Vigenere
Cipher,
Transposition
Cipher and
ROTOR
Machines
Block Ciphers
Playfair cipher,
Hill cipher,
Affine cipher
and DES.
Advanced
Encryption
Standard
Key creation,
Encryption,
Decryption, and
3DES
PSEUDORAND
OM NUMBER
GENERATION
AND STREAM
CIPHERS
Public key
encryption
RSA cipher and
3
A3, B2,B3,
C2, D1
Homework
A3,B3,C2,D2
Quiz +
Homework
attendance,
Discussion,
handouts
Loai Alnemer
4,5
6,7
8
Loai Alnemer
Loai Alnemer
Loai Alnemer
A3,B3,C2,D2
A3,B3,C2,D2
9
A4,B3,C3,D2
10
A4,B3,C3,D2
Quiz +
Homework
Homework
Chapters 4,7
attendance,
discussion,
reading:
handout ,
Chapter 7
attendance,
discussion,
reading:
handout ,
Chapter 9
others
Project
assignment
Hashing
Hash function,
One-way
functions,SHA1,
MDs and Digital
Signature
INFORMATIO
N HIDING
Steganography,
Watermarking,
Text Hiding.
DATABASE
SECURITY
AND WEB
SECURITY
SQL
INJECTION,
DATA
ENCRYPTION,
HTTPS, SSL,
OTHERS
Project
Discussion
11,12
A5, B4, D3
13,14
A6,B5,C4,D2,
D3
15
A7
16
D4
22. Teaching Methods and Assignments:
Development of ILOs is promoted through the following teaching and learning methods:
23. Evaluation Methods and Course Requirements:
Opportunities to demonstrate achievement of the ILOs are provided through the following assessment methods
and requirements:
Quizzes and homeworks through the semester. Midterm exam , Project and Final exam
24. Course Policies:
A- Attendance policies:
Students are allowed up to 7 absences. If you exceed this number, you will fail the class.
B- Absences from exams and handing in assignments on time:
All projects and assignments are to be uploaded to the course website.
-mail and Moodle regularly. Students are responsible for information posted
there. If critical information is posted in Moodle that you must read today, an announcement to check elearning will be sent to the mailing list.
C- Health and safety procedures:
D- Honesty policy regarding cheating, plagiarism, misbehavior:
Discussion of the concepts and principles between students is fine and very welcomed. Also, students are
allowed to debug each other’s code. However, Student cooperation should not result in identical or near
identical answers/code/documentation. ALL THE MATERIAL SUBMITTED FOR GRADING MUST BE
YOUR OWN EFFORT.
If this policy is violated then the following steps may be taken: (1) reduction of points by dividing by the
number of students involved in an incident, (2) assignment of a grade of ZERO for all students involved in an
incident.
E- Grading policy:
Midterm Exam 30% Quizzes and assignments 10% Project 10% Final Exam 50%
F- Available university services that support achievement in the course:
25. Required equipment:
None
26. References:
Required book (s), assigned reading and audio-visuals:
Alfred Menezes, Paul van Oorschot and Scott Vanstone, Handbook of Applied Cryptography, CRC
Press, 2001. ISBN: 0-8493-8523-7. Published online free for personal usage as per the copyright notice.
Available online at http://www.cacr.math.uwaterloo.ca/hac/
Recommended books, materials, and media:
The following books are recommended for the student who wants more material in algebra and number
theory:
1. Wenbo Mao, Modern Cryptography: Theory and Practice. Prentice Hall 2004.
3. V. Shoup. A Computational Introduction to Number Theory and Algebra. An excellent source, written with
Cryptographic applications in mind. Available online: http://www.shoup.net/ntb/ntb-v1.pdf
4. D. Anglian: Lecture Notes on the Complexity of Some Problems in Number Theory. L.N. Childs: A
Concrete
Introduction to Higher Algebra.
5. Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Digital watermarking, Morgan Kaufmann, 2002
27. Additional information:
None
Name of Course Coordinator: -------------------Signature: ------------------------- Date: ------------------------ Head of curriculum committee/Department: ------------------------- Signature: -------------------------------Head of Department: ------------------------- Signature: --------------------------------Head of curriculum committee/Faculty: ------------------------- Signature: -------------------------------Dean: ------------------------------------------- -Signature: ---------------------------------
Copy to:
Head of Department
Assistant Dean for Quality Assurance
Course File
Download