CPIS 410 - Information Security
|

Course Description
Concepts
and applications of system and data security. Topics include risks and
vulnerabilities, policy formation, controls and protection methods, database
security, encryption, authentication technologies, host-based and network-based
security issues, personnel and physical security issues, issues of law and
privacy. Areas of particular focus include secure network design,
implementation and transition-issues,and techniques for responding to security
breaches.
Grading Policy
Course Schedule:
Week #
|
Topic
|
Chapters Covered
|
1
|
- Introduction to the course
- Overview
|
Chapter 1
|
2
|
- Computer Security Concepts
- OSI Security Architecture
- Security Attacks
- Security Services
- Security Mechanisms
- Model of Network Security
|
3
|
4
|
Classical Encryption Techniques
- Symmetric Cipher Model
- Substitution Techniques
- Transposition Techniques
Block Cipher and Data Encryption Standard
|
Chapter 2
&
Chapter 3
|
5
|
- DES
- DES example
- Strength of DES
Basic Concepts in Number Theory and Finite Fields
- Divisibility and Division Algorithm
|
Chapter 3
&
Chapter 4
|
6
|
- Euclidean Algorithm
- Modular Arithmetic
- Groups, rings and Fields
- GF
- Polynomial Arithmetic
|
Chapter 4
&
Revision
|
7
|
Advanced Encryption Standard
- Finite field arithmetic
- AES Structure
- AES transposition function
- AES key Expansion
Public Key Cryptography
- Principles of Public-key cryptosystem
- RSA Algorithm
|
Chapter 5
&
Chapter 9
|
8
|
Cryptographic Hash Function
- Applications of Hash Functions
- Simple Hash Functions
- Requirements and Security
- SHA
|
Chapter 11
|
9
|
Message Authentication Codes
- Message Authentication Requirements
- MAC Functions
- Requirements of MAC
- HMAC
- MAC based on block cipher
|
Chapter 12
|
10
|
11
|
Digital Signatures
- Digital Signatures
- Elgamal Digital Signature
- Digital Signature Standard
|
Chapter 13
|
12
|
Transport Level Security
- Web security considerations
- SSL and TL Security
- TLS
- HTTPS
|
Chapter 16
|
13
|
Wireless Network Security
- IEEE 802.11 Wireless LAN
- IEEE 802.11i Wireless LAN security
- WAP
- Wireless Transport Layer Security
|
Chapter 17
|
14
|
Revision
&
Group Project Presentations
|
|
|
Final Exam all sections
|
|
To read more:
|