Course Code:CSE-4743
Course Title: Computer Security
Credit Hours: 3
Contact Hours: 3 lecture hours per week
Type: Core, Engineering
Prerequisite: CSE-3633 (Computer Networks)
Co-requisite: CSE-4744 (Computer Security Lab)
Course Objectives:
To provide introduction to the concept of Network Security Model and Cryptography
systems.
To give the knowledge of Digital Signature and other Security Measures available.
To familiarize with the various techniques like PGP and S/MIME.
To showcase IP Security Architecture & Transport Layer Security to identify the
vulnerability of the Internet systems and recognize the mechanisms of the attacks.
To explain the firewall design principles and various intrusion detection system.
To understand the network privacy and crypto currency.
Course Outcomes (COs):
# CO Description Weightage (%)
CO1 Understand the concepts of computer security and various 30
symmetric and asymmetric cryptographic methods.
CO2 Apply cryptographic techniques e.g. digital signature, PGP, 30
S/MIME etc.
CO3 Evaluate ip security architecture & transport layer security 20
CO4 Apply firewall design principles to detect various intrusion 20
systems for achieving maximum system security.
Mapping of CO-PO:
# CO Description POs Bloom’s Taxonomy Delivery Assessment
Domain/Level Methods Tools
and
activities
CO1 Understand the PO1 Cognitive/Understand Lecture Class Exam
concepts of Discussion Quiz
computer Assignment Assignment
security and
various
symmetric and
asymmetric
cryptographic
methods.
# CO Description POs Bloom’s Taxonomy Delivery Assessment
Domain/Level Methods Tools
and
activities
CO2 Apply PO2 Cognitive/Apply Lecture Class Exam
cryptographic Discussion Quiz
techniques e.g. Assignment Assignment
digital
signature, PGP,
S/MIME etc.
CO3 Evaluate ip PO4 Cognitive/ Evaluate Lecture Class Exam
security Discussion Quiz
architecture & Assignment Assignment
transport layer
security
CO4 Apply firewall PO1 Cognitive/Apply Lecture Class Exam
design Discussion Quiz
principles to Assignment Assignment
detect various
intrusion
systems for
achieving
maximum
system security.
Course Content:
Section-A (Mid-term: 30% Marks)
1. Overview: Computer Security Concepts, Security Attacks, Security Services, Security Mechanism,
A Model for Network Security.
2. Symmetric Ciphers: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques,
Steganography, Block Ciphers and the Data Encryption.
3. Euclid’s Algorithm, Placement of Encryption Function, Traffic Confidentiality, key distribution.
Section-B (Final Exam: 50% Marks)
4. Public Key Crypto System and RSA: Prime Numbers, Fermat’s and Euler’s Theorems, Principles
of Public-Key Cryptography, the RSA Algorithm, Key Management, Diffie- Hellman Key
Exchange
5. Cryptographic Hash Function: Applications, Requirements & Security, SHA-3, Authentication
Requirements, Authentication Functions, Digital Signatures, Digital Signature Standards.
Authentication Application & Electronic Mail, Security: Kerberos, X.509 Authentication Service,
Pretty Good Privacy, S/MIME.
6. IP Security and Web Security: IP Security overview, IP Security Policy, Encapsulating Security
Payload, Transport Level Security
7. Wireless Network and Mobile Security: Challenges, Attacks based on Communication,
vulnerabilities in Software application, Countermeasures System Security: Intruders, Intrusion
Detection, Firewalls, Cloud Security: Threats, Cloud Security Controls.
8. Network Privacy, TOR Network, Blockchain Algorithm, Crypto Currency
Text Books:
1. William Stallings, Cryptography and network Security Principles and Practice, 5th Edition,
"Pearson Education Inc." 2015, ISBN 13: 978-0-13-335469-0
2. Behrouz A. Forouzan, Data Communications and Networking, 5th Edition, McGraw-Hill
Education 2012, ISBN-13: 978-0073376226
Reference Books:
1. Andreas M. Antonopoulos, Mastering Bitcoin, 1st Edition "O’Reilly Media Inc." , ISBN:
978-1-449-37404-4
2. James Kurose and Keith Ross, Computer Networking: A Top-Down Approach, 7th Edition
Pearson, and ISBN-13: 978-0133594140
3. Andrew S. Tanenbaum and David J. Wetherall, Computer Networks, 5th Edition, Prentice
Hall ISBN-13: 978-0-13-212695-3