Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

INFORMATION SECURITY

BY: Muhammad Hanif


Today’s Agenda
 Introduction
 Course details
 Teaching

 Assessment

 What is this course about


Teaching
 Instructor
 Muhammad Hanif
◼ BS IT (Hons) (University of Malakand)
◼ MS IT (Networking) (NUST, SEECS Islamabad)
◼ PhD (Information Security) (NCBA&E, Lahore)

 Office: 2nd Floor


 Email: mhanifkhan@gmail.com

mhanif.bulc@bahria.edu.pk
Get to Know You?
 Brief Introduction
 Name

 Qualification

 Why this degree?


 Future Planning? (Vision)
Teaching Support
 Information security
 Text Book: Cryptography and Network Security
 by William Stalling
 Principles of Information Security
 by Michael E. Whitman and Herbert J. Mattord
 Course Code: CSC-407
 Lecture Hours:
 3-hour lecture per week
 Pre -Requisite : Data Communication and Networking
Assessment ☺
 Midterm Exam (1) : 20 %
 Final Term (1) : 50 %
 Sessional : 30 %
 Quizzes (Announced, Unannounced)
 Assignments / Homework

 Class participation

 Attendance
Basic Ground Rules
 Attendance in lectures is compulsory (at least 75%)
 If you think you have something better to do, be my guest
 But if you do decide to attend then:
 Please do not talk with your friends

 It disturbs the flow of the lecture

 It is especially annoying to your class‐mates


 I will give you opportunities to make your point
 Interaction is the key
 Please ask questions

 If you don’t understand it, ask

 Let me know if I am going too slow, too fast


 And please switch off your mobiles !!
Class work and Home work
 Selection of CR – If not already selected.
 Arranging text book from Library or Market or PDF.
 The lectures and course contents will be share with
you via LMS and MS Teams
 Assignments will be collected from you via LMS
 Will try to have few quizzes and also home works
which will be collected accordingly either via LMS
or MS Teams or email.
Information Security
Course Description
 The course provides a study of the principles and
practice of security for both stored and transmitted
information.
 It addresses the fundamental principles of computer
and network security and covers: Internet Threats
and Hacking Techniques, Firewall Security, Intrusion
Detection Systems, Authentication, Encryption
Technologies, Public Key Management, Virtual
Private Networks and Wireless Network Security.
By the end of course the students will
be able to:
 Understand and describe cryptographic algorithms, discuss their use and
the issues of strength.
 Learn computer security technology and principles such as authentication,
denial of services, intrusion detection, and firewalls
 Recognize security threats and their countermeasures in software, computer
systems, networks
 Understand the protocols and standards used to provide security for
communications across the Internet
 Apply the security fundamentals to management aspects of information and
computer security.
 Develop the ability to compare and evaluate computer security techniques
 Develop an awareness of current and emerging computer and network
security technologies
 Gain knowledge necessary for the study of advanced topics in the field of
computer and network security.
Topics to be covered:
 The OSI Security Architecture
 Security Attacks, Services & Mechanisms
 Symmetric Ciphers
 Classical Encryption Techniques
 Block Ciphers and Data Encryption Standard
 Advanced Encryption Standard
 Asymmetric Ciphers
 Public-Key Cryptography and RSA
 Public-Key infrastructure
 Data Integrity Algorithms
 Cryptographic Hash Function
 Message Authentication Codes
 Digital Signatures
 Kerberos
 Internet Security
 Wireless Network Security

You might also like