Computer security: principles and practice

Tags: ILO, Intrusion Prevention Systems, Relevant issues, problem solving skills, Teaching & Learning Methods Class lectures, Self-study, Office Location Office Phone E-mail Instructors, group activity, Qussai Yaseen Instructor Dr, User authentication, Discretionary Role-Based Access Control, Qussai M. Yaseen, Database Access Control, Intrusion Detection, Class Discussions, Class lectures, security principles, William Stallings, Information Security Course Catalog, Information Technology Computer Information Systems Department CIS, successful student, CIS, Message authentication, Information Security, Computer Security, covers, applied cryptography, Network Security, Students
Content: Jordan University of Science and Technology Faculty of Computer & information technology Computer information systems Department CIS 433 Information Security Course Catalog 3 Credit hours (3 h lectures). The course covers classic security topics, such as applied cryptography, authentication, authorization and basic security principles. Furthermore, it covers some recent topics such as web security and virtual machines security. The topics that the course covers are listed below: Overview: Confidentiality, Integrity, Availability. Security policy and mechanism. Basic principles of secure System Design. Cryptography: Basic crypto primitives, Secret key crypto, public key crypto, Digital signatures, Message authentication. System security: Authentication, Access Control, Discussion of popular systems and security protocols. Network Security: Firewalls, Intrusion Prevention Systems, DHCP spoofing and snooping, MAC flooding.
Course Title Course Number Prerequisites Course Website
Course Information Information Security CIS 433 Statistics (Math131) & Data Structures (CIS 328)
Title Author(s) Publisher Year Book Website Edition
Text Book(s) computer security: Principles and Practice William Stallings and Lawrie Brown Pearson Education 2015 https://www.pearsonhighered.com/program/Stallings-Computer-Security-Principles-and-Practice3rd-Edition/PGM153489.html 3rd
Books Internet links
References Security in Computing by Pfleeger, Pfleeger, Margulies. Prentice Hall, 2015, 5th ed https://www.pearsonhighered.com/program/Pfleeger-Security-in-Computing-5thEdition/PGM25284.html
Instructors Office Location Office Phone E-mail
Instructors Dr. Qussai M. Yaseen Engineering Building N2 L0 Ext. 22399 [email protected]
1
Ftoon abu Shaqrah
Teaching Assistant
Section 1
Time 9:30 ­ 10:30
Class Schedule & Room
Days
Room
Sunday, Tuesday, Thursday CIS01 Lab
Instructor Dr. Qussai Yaseen
Instructor Dr. Qussai Yaseen
Office Hours Days Sunday, Tuesday, Thursday Monday, Wednesday
Time 10:30 -11:30 11:30 ­ 12:30
Topics Covered
The schedule is subject to change depending upon the actual class dynamics and workflow during the semester
Topic
Chapters in Text
Related Week No.
CLOs
Introduction. Basic security principles.
Chapter 1
ILO 1
1
Cryptography: Simple symmetric-key ciphers. DES.
Chapter 2 + Chapter 20
ILO 7
2,3
ILO 5
Public-key cryptography and RSA, Diffie-Hellman.
Chapter 2 + Chapter 21
ILO 7
3, 4
ILO 5
User Authentication: Means of Authentication, PasswordBased, Token-Based, Biometric, Remote User authentication. Security Issues for User Authentication.
Chapter 3
ILO 5
5
ILO 11
Access Control: Access Control Principles. Subjects, Objects Chapter 4 and Access Rights. Discretionary Role-Based Access Control.
ILO 5
6,7
ILO 3
ILO 11
Database and Cloud Security: Database Access Control.
Chapter 5
Inference. Database Encryption. Data Protection in the Cloud
Malicious Software: Viruses. Worms. Bots. Rootkits.
Chapter 6
Intrusion Detection: Intruders. Intrusion Detection. HostBased and Distributed Host-Based Intrusion Detection. Network-Based Intrusion Detection. Honeypots.
Chapter 8
ILO 4 ILO 3 ILO 11 ILO 4 ILO 3 ILO 11 ILO 4 ILO 3 ILO 11
8,9 10,11 12,13
Network Security, Firewalls and Intrusion Prevention Systems: Firewall Characteristics. Types of Firewalls. Firewall Location and Configurations. Intrusion Prevention Systems. MAC address Flooding, DHCP starvation and Spoofing.
Chapter 7 + 9
ILO 4 ILO 3 ILO 11
14,15
Course Objectives
2
No.
Course Learning Outcomes (CLOs)
Mapping CLOs to ABET POs
A successful student in this course will be able to
1 be familiar with information security concepts
and terms.
A successful student in this course will be able to
2 use symmetric and asymmetric encryption
methods.
A successful student in this course will be able to
3 code a hacking system that teach students how
attackers think and hack systems.
A successful student in this course will be able to
4
analyze access control methods and their differences, and implement an access control
method.
5
A successful student in this course will be able to design some types of malicious software.
A successful student in this course will be able to
6 understand how countermeasures works and how
intruders may bypass security countermeasures.
ILO 1 ILO 7 ILO 5 ILO 5 ILO 11 ILO 3 ILO 5 ILO 11 ILO 4 ILO 4
assessment methods Exams Exams, Labs Project Exams, Project Exams, Labs Exams, Labs
Relationship to Program Outcomes (score out of 5)
Program Outcome
ABCDEFGHIJKLMN
Mapping Score 5
244
2
4
3
Assessment Tool First Exam Second Exam Activity/ Assignment/Project Final Exam
Evaluation Expected due date TBD TBD TBD TBD
Weight 15% 15% 30% 40%
Teaching & Learning Methods Class lectures: Class lectures will expose students to the knowledge required by this course Class Discussions: Relevant issues will be discussed in class. These discussions are supposed to improve the students' communication and problem solving skills by motivating them to express their opinions. Activity: Students will be expected to work on a group activity. The activity could be a small software project, or a case study of a healthcare provider. In addition to improving the students' technical and analytical skills, this project aims at improving the students' team work, self-management, and planning and organizing skills. Self-study: Students will be required to study one of the assigned chapters as self-study. A number of questions from the self-study CHAPTER will be included in the exam. This learning method aims at improving the students' learning skills.
Attendance Participation Activity Exams Makeup Exams Workload Code of Conduct
Other Policies and Notes Excellent attendance is expected. In accordance with university regulations, students missing more than 20% of total classes are subject to failure. No excuses will be accepted. If you miss class, it is your responsibility to find out about any announcements or assignments you may have missed. Attendance will be recorded at the beginning or end of each class. You are expected to participate in class. Participation includes asking and answering questions, raising issues, and suggesting solutions to the discussed problems. Students are expected to work on an activity within a group of 3-4 students. The activity could be a small software project, or a case study of a healthcare provider. All exams will be CLOSE-BOOK. The format for the exams is generally as follows: multiplechoice, and short essay questions. Makeup exam should not be given unless there is a valid excuse. Arrangements to take an exam at a time different than the one scheduled MUST be made prior to the scheduled exam time. In accordance with university regulations, students should bring a valid excuse authenticated through valid channels in JUST. Average work-load student should expect to spend is 4 hours/week. Quizzes and exams need to be done individually. Copying of another student's work, even if changes are subsequently made, is inappropriate, and such work will not be accepted. Cheating or copying from neighbor on exam is an illegal and unethical activity and standard JUST policy will be applied. All graded assignments must be your own work.
4

File: computer-security-principles-and-practice.pdf
Title: United
Author: PC
Published: Tue Feb 28 16:14:38 2017
Pages: 4
File size: 0.2 Mb


Doing psychological research, 22 pages, 0.09 Mb

, pages, 0 Mb

Growing old in prison, 53 pages, 0.3 Mb
Copyright © 2018 doc.uments.com