0% found this document useful (0 votes)
16 views3 pages

Computer Security Syllabus

Uploaded by

Md. Asiful Islam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views3 pages

Computer Security Syllabus

Uploaded by

Md. Asiful Islam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Course Code:CSE-4743

Course Title: Computer Security


Credit Hours: 3
Contact Hours: 3 lecture hours per week
Type: Core, Engineering
Prerequisite: CSE-3633 (Computer Networks)
Co-requisite: CSE-4744 (Computer Security Lab)

Course Objectives:
To provide introduction to the concept of Network Security Model and Cryptography
systems.
To give the knowledge of Digital Signature and other Security Measures available.
To familiarize with the various techniques like PGP and S/MIME.
To showcase IP Security Architecture & Transport Layer Security to identify the
vulnerability of the Internet systems and recognize the mechanisms of the attacks.
To explain the firewall design principles and various intrusion detection system.
To understand the network privacy and crypto currency.

Course Outcomes (COs):

# CO Description Weightage (%)


CO1 Understand the concepts of computer security and various 30
symmetric and asymmetric cryptographic methods.
CO2 Apply cryptographic techniques e.g. digital signature, PGP, 30
S/MIME etc.
CO3 Evaluate ip security architecture & transport layer security 20

CO4 Apply firewall design principles to detect various intrusion 20


systems for achieving maximum system security.

Mapping of CO-PO:

# CO Description POs Bloom’s Taxonomy Delivery Assessment


Domain/Level Methods Tools
and
activities
CO1 Understand the PO1 Cognitive/Understand Lecture Class Exam
concepts of Discussion Quiz
computer Assignment Assignment
security and
various
symmetric and
asymmetric
cryptographic
methods.
# CO Description POs Bloom’s Taxonomy Delivery Assessment
Domain/Level Methods Tools
and
activities
CO2 Apply PO2 Cognitive/Apply Lecture Class Exam
cryptographic Discussion Quiz
techniques e.g. Assignment Assignment
digital
signature, PGP,
S/MIME etc.
CO3 Evaluate ip PO4 Cognitive/ Evaluate Lecture Class Exam
security Discussion Quiz
architecture & Assignment Assignment
transport layer
security

CO4 Apply firewall PO1 Cognitive/Apply Lecture Class Exam


design Discussion Quiz
principles to Assignment Assignment
detect various
intrusion
systems for
achieving
maximum
system security.

Course Content:
Section-A (Mid-term: 30% Marks)

1. Overview: Computer Security Concepts, Security Attacks, Security Services, Security Mechanism,
A Model for Network Security.
2. Symmetric Ciphers: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques,
Steganography, Block Ciphers and the Data Encryption.
3. Euclid’s Algorithm, Placement of Encryption Function, Traffic Confidentiality, key distribution.
Section-B (Final Exam: 50% Marks)

4. Public Key Crypto System and RSA: Prime Numbers, Fermat’s and Euler’s Theorems, Principles
of Public-Key Cryptography, the RSA Algorithm, Key Management, Diffie- Hellman Key
Exchange
5. Cryptographic Hash Function: Applications, Requirements & Security, SHA-3, Authentication
Requirements, Authentication Functions, Digital Signatures, Digital Signature Standards.
Authentication Application & Electronic Mail, Security: Kerberos, X.509 Authentication Service,
Pretty Good Privacy, S/MIME.
6. IP Security and Web Security: IP Security overview, IP Security Policy, Encapsulating Security
Payload, Transport Level Security
7. Wireless Network and Mobile Security: Challenges, Attacks based on Communication,
vulnerabilities in Software application, Countermeasures System Security: Intruders, Intrusion
Detection, Firewalls, Cloud Security: Threats, Cloud Security Controls.
8. Network Privacy, TOR Network, Blockchain Algorithm, Crypto Currency

Text Books:
1. William Stallings, Cryptography and network Security Principles and Practice, 5th Edition,
"Pearson Education Inc." 2015, ISBN 13: 978-0-13-335469-0
2. Behrouz A. Forouzan, Data Communications and Networking, 5th Edition, McGraw-Hill
Education 2012, ISBN-13: 978-0073376226

Reference Books:
1. Andreas M. Antonopoulos, Mastering Bitcoin, 1st Edition "O’Reilly Media Inc." , ISBN:
978-1-449-37404-4
2. James Kurose and Keith Ross, Computer Networking: A Top-Down Approach, 7th Edition
Pearson, and ISBN-13: 978-0133594140
3. Andrew S. Tanenbaum and David J. Wetherall, Computer Networks, 5th Edition, Prentice
Hall ISBN-13: 978-0-13-212695-3

You might also like