Course Outline
1. Introduction to Computer Security and Privacy
1.1 Overview
1.2 Brief History of Computer Security and Privacy
1.3 Computer Security Controls
1.4 Physical Security
2. Computer Security Threats and Attacks
2.1 Threats and Attacks
2.2 Malware Attack
2.3 Internet Fraud
1
3. Cryptography and Encryption Techniques
3.1 Introduction
3.2 Symmetric Cryptosystems
3.3 Asymmetric Cryptosystems
3.4 Concluding Remarks about Encryption Mid Exam
4. Network Security Concepts and Mechanisms
4.1 Introduction
4.2 What is Network Security?
4.3 Network Protocols and Vulnerabilities
4.4 Web Security
4.5 Application Layer Security
4.6 E-mail Security
2
5. Security Mechanisms and Techniques
5.1 Introduction
5.2 Access Control
5.3 Authentication
5.4 Firewall
5.5 Intrusion Detection/Prevention
6. Information Security Policies and Procedures
6.1 Information Security Policy
6.2 Legal Issues and Information Security
For your
7. Security Evaluation Reading
7.1 Introduction
7.2 Security Assessment Components
7.3 Methods for Security Evaluation
3
References
1. William Stallings, Network Security Essentials, Pearson,
5th edition, 2014.
2. William Stallings, Cryptography and Network Security
Principles and Practice, Prentice Hall, 5th edition, 2011.
[Soft Copy, 4th Edition]
3. Chuck Easttom, Computer Security Fundamentals,
Prentice Hall, 2nd edition, 2012. [Soft Copy]
4. Matt Bishop, Introduction to Computer Security, Addison
Wesley, 2005. [Soft Copy]
5. Michael Erbschloe, Physical Security for IT, Elsevier, 1st
edition, 2005.
6. D. Russel and G. Gangemi, Computer Security Basics,
O'Reilly Media, 2nd edition, 2006.
7. Security Complete, BPB Publications.
8. Information Security Policies and Procedures, Thomas R.
Peltier.
4
Mode of Delivery
Lectures - preferably interactive (ask questions, intervene in
discussions)
Evaluation
Mid Exam
Final Exam
Assignments