Course Outline - Isra University

advertisement
Al-Isra Private University
Faculty of Science and Information Technology
Department of CS
Course Plan
___________________________________________________________________________________
Course No.:
601320
Course Name:
Information Security
Course Website:
1
Course Classification:
Department Compulsory (CIS)
Time Division:
3 Lectures
Semester & Year:
Course Description: (3 credit hours, Prerequisite: 604235/ Probability and Statistics)
Information security basics, classical encryption and block ciphers, modern symmetric ciphers,
confidentiality using symmetric ciphers, public-key cryptosystems and key management,
message authentication and hash, digital signatures, IP and Web security, firewalls and trusted
systems, software threats (Viruses, Worms).
Course Intended Outcomes:
At the end of the course, students are expected to learn:
- Information systems security issues.
- Planning and administration of a secure computer systems
- Different methods of encryption and decryption of information
- Internet security related issues.
Course Outline
Week
starts
on
1
2
Sun Class (Text Sec.)
Tue Class (Text Sec.)
Thu Class (Text Sec.)
Course outline description
Chapter 1: Introduction to
- Security services, (1.3)
Computer Security, (1.1)
- Security Attacks (1.2)
- A Model for Network &
- Cryptographic System (Data - A Model for Access control
Network Access Security,(1.4) security), Cryptanalysis, (1.4) Security, (1.4)
3
Chapter 2:Classical encryption
Techniques; classification (2.1)
- Symmetric Cipher Model,
- Caeser Cipher, (2.3).
- substitution Techniques (2.2) - Monoalphabetic Cipher
4
- Play Fair Cipher, (2.3)
- Polyalphabet Cipher
(Vigenere Cipher)
- Matrix transposition..
- Code Book
- Hill Cipher
Transposition Techniques:
- Rail Fence.
- Skytale Cipher.
- Bit Manipulation Cipher.
Chapter 3: Modern Encryption
Techniques; S-DES, (3.1, 3.2 ,
5
3.3)
6
- DES Encryption
- Simple DES
7
- Review.
- Chapter 4; Public Key
Cryptography, Public Key
Principle, Cryptosystems, (6.1)
8
- Symmetric Versus Public key
Encryption.
- Essential Elements of Public
key Encryption.
- S-DES Relationship to
DES
- Block cipher Principles.
First Exam.
-Applications for Public key
Encryption.
-RSA Algorithm, Design &
Examples.
- More international
algorithms: 3DES, Blowfish,
RC5, IDEA.
- Return of exam papers and
Discussion of Exam Results
- Public Key Principle,
Cryptosystems, (6.2, 6.3
- Mini RSA.
- Security of RSA
Al-Isra Private University
Faculty of Science and Information Technology
Department of CS
Course Plan
___________________________________________________________________________________
Chapter 5: Message
- Message Authentication and
Authentication and Hash
Requirements.
Technologies (8.1, 8.2, 8.3,
- Authentication Functions.
8.4, 8.4, 8.5)
- Message Auth. Code (MAC)
-Digital Signature and
Chapter 6: Access Control;
Authentication Protocols
( - System Access Control.
10.1, 10.2 , 10.3)
- Hints for protecting
- Digital Signature Standard
passwords.
9
10
11
- IP Security ( 13.1)
- Review
12
- IP Security Architecture
(13.2)
13
-
14
Second Exam
Viruses and Worms (15.2)
Viruses and Related Threats
Viruses and Worms(15.2)
Viruses and Related Threats
15
- Web Security ( 14.1, 14.2,
14.3)
- Web Security requirements
Third Exam
Firewalls (16.1)
- Firewall Design Principles
Hash Functions
Security of Hash Functions
and MACs
- Access Control, Data Access,
Discretionary Access
Control, DAC.
- File Protection.
- Self/Group/Public Control.
- Return of exam papers and
Discussion of Exam Results
-IP Security Overview
- Secure Socket Layer and
- Transport Layer Security
- Secure E- Transaction
- Viruses and Worms(15.2)
- Viruses and Related Threats
Firewalls
-Trusted Systems (16.2)
Final Exam
Textbook
- Cryptography and Network Security, principles and practice, 6th, 2007,
William Stallings.
Suggested references
1.
2.
3.
4.
5.
6.
7.
8.
Computer security Basics, Deborah Russell and G.T.Gangemi,1992.
Information security and Cryptography, Kwangio Kim, 2002.
Introduction to cryptography principles and applications, Springer, 2002.
Cryptography and Network Security, Atul Kahate, 2003.
Information Security, Agnes Hui Chan, 2002.
Information Security handbook, John M.D. Hunter, 2002.
Practical guide to Computer Security, Donald L Pipkin,2003.
Network Security: a practice guide, Owen poole,2003
Marking
First Exam
Second Exam
Activity
Final Exam
25 marks
25 marks
10 marks
40 marks
Regulations
1.
2.
3.
4.
2
There will be three term exams given during this semester. The best two out of three will be considered for
the First and Second Exam. This means: there will be NO makeup exams! Missing one of the two left
exams means a ZERO grade will be given for that exam.
There will NOT be any makeup for quizzes
Attendance is mandatory and University regulations will be enforced.
All Cheating incidents will be reported to the chair. The following activities are considered cheating:
a. Turning in assignment that includes parts of someone else's work.
Al-Isra Private University
Faculty of Science and Information Technology
Department of CS
Course Plan
___________________________________________________________________________________
b. Turning in someone else’s assignment as your own.
c. Giving assignment to someone else to turn in as their own.
d. Copying answers in a test or quiz.
e. Taking a test or quiz for someone else.
f. Having someone else take a test or quiz for you.
3
5. See Student handbook for other regulations.
Assignments and/or Projects
Assignments /
Description
Projects
H.W.1
Encryption/ Decryption
Using S-DES,
Vigenere ciphers
H.W.2
Encryption Using RSA
, Diffie-Helman
ciphers
Quizzes
Four or more quizzes
Due Date
Marking
TBA
2 MARK
TBA
2 MARK
TBA
6 MARK
Emailing Guidelines:
1.
2.
3.
4.
All homework, assignments, projects, etc., are sent by email to the email address shown below ( under
Instructor’s Information).
Be sure to send them before the due date.
Fill in the subject field of the email using the following format:
CS301_Family-Name_First-Name_Subject , where:
a) CS301 is abbreviation for the course. Other courses should have similar abbreviations
b) Family-Name and First-Name are replaced by your family name and your first name.
c) Subject is replaced by the title of the assignment, project, etc.
You may also use the email to ask questions about the course. In this case, just type the world “question” in
the place of _Subject as described in 3-c above.
Instructors' information
Section: 1
Lecture Room:
4139
Instructor's Name: Dr. Hamza Abbass Alsewadi
Email : alsewadi@isra.edu.jo
Office Hours:
Time: 9:00-10:00 (Sun, Tue, Thu)
Office No.: 4111
10:00-11:00] Sun., [12:00-1:00] Tue., [1:00-2:00] Thu.
[9:30-11:00] Mon. and [12:30-2:00] Wed.
Other office hours are available by appointment
Important: The content of this syllabus may not be changed during the current semester.
Instructor
Council Chair
Download