CPIS 410 - Information Security

Course Description

Concepts and applications of system and data security. Topics include risks and vulnerabilities, policy formation, controls and protection methods, database security, encryption, authentication technologies, host-based and network-based security issues, personnel and physical security issues, issues of law and privacy. Areas of particular focus include secure network design, implementation and transition-issues,and techniques for responding to security breaches.

 

 Grading Policy


 

Course Schedule:

Week #

Topic

Chapters Covered

1

  • Introduction to the course
  • Overview

Chapter 1

2

  • Computer Security Concepts
  • OSI Security Architecture
  • Security Attacks
  • Security Services
  • Security Mechanisms
  • Model of Network Security

3

4

Classical Encryption Techniques

  • Symmetric Cipher Model
  • Substitution Techniques
  • Transposition Techniques

Block Cipher and Data Encryption Standard

  • Block Cipher Principles


Chapter 2

&

Chapter 3

5

  • DES
  • DES example
  • Strength of DES

Basic Concepts in Number Theory and Finite Fields

  • Divisibility and Division Algorithm

Chapter 3

&

Chapter 4

6

  • Euclidean Algorithm
  • Modular Arithmetic
  • Groups, rings and Fields
  • GF
  • Polynomial Arithmetic

Chapter 4

&

Revision

7

Advanced Encryption Standard

  • Finite field arithmetic
  • AES Structure
  • AES transposition function
  • AES key Expansion

Public Key Cryptography

  • Principles of Public-key cryptosystem
  • RSA Algorithm

Chapter 5

&

Chapter 9

8

Cryptographic Hash Function

  • Applications of Hash Functions
  • Simple Hash Functions
  • Requirements and Security
  • SHA

Chapter 11

9

Message Authentication Codes

  • Message Authentication Requirements
  • MAC Functions
  • Requirements of MAC
  • HMAC
  • MAC based on block cipher

Chapter 12

10

11

Digital Signatures

  • Digital Signatures
  • Elgamal Digital Signature
  • Digital Signature Standard

Chapter 13

12

Transport Level Security

  • Web security considerations
  • SSL and TL Security
  • TLS
  • HTTPS

Chapter 16

13

Wireless Network Security

  • IEEE 802.11 Wireless LAN
  • IEEE 802.11i Wireless LAN security
  • WAP
  • Wireless Transport Layer Security

Chapter 17

14

Revision

&

Group Project Presentations



Final Exam all sections


 

To read more:


آخر تحديث
6/15/2015 4:46:49 AM