Professional Documents
Culture Documents
Information Security: Sulaimani Polytechnic University
Information Security: Sulaimani Polytechnic University
Course Information
Course name: Information Security
Course Code ISC20X
Instructor: Rebaz N. Ramadhan
Faculty\ department: SPU : IT, Database depts
Contact information: Address: Department.
E-mail: Rebaz.najeeb@koyauniversity.org
Timetable
Day Time Hall
Classes 9:00 – 11:00 Hall IT G1
Monday 11:00-1:00 Hall IT G2
1:00 – 3:00 Hall DB
Evening
Monday 4:30 – 6:00 Hall DB
GRADING
the students are required to take two closed-book class tests.
1st Mid-term Exam. 20% + %5 activity
2nd Mid-term Exam 20% + 5% activity
Final Exam 50%
HACK ME IF YOU CAN… You will get your reward….
Rebaz.eng@gmail.com
1 | P a g e
InfoSec Course Book Mr. ReBaz NaJeeb R.
After completing this course, students should have the following skills:
• Familiar with the notions of Information Security principles CIA.
• Have clear understanding of threats, and techniques to protect your computing device.
• Be able to apply the most of the data security algorithms.
• To know how to cipher and decipher plain text by using different encrypting algorithms.
• Be familiar with Traditional, and modern cryptography.
• Be able to define DES, and RSA.
• Be able to differentiate among virus, Trojan, worm, and etc.
2 | P a g e
InfoSec Course Book Mr. ReBaz NaJeeb R.
Introduction to Security
- Aspects of Security
- Security Attacks
Lecture 1 - Security Service
- Security Mechanism
- Model for Network Security
-Cyber Security
CIA and more
- Confidentiality
Lecture 2 - Integrity
- Availability
- More objectives.
Security Threats
Lecture 3
- Interception
3 | P a g e
InfoSec Course Book Mr. ReBaz NaJeeb R.
- Interruption
- Modification
- Fabrication
- Types of intruders
Introduction to cryptography
- Cipher system
Lecture 4 - Some Basic Terminology
- Cipher system requirements
- Classification of Cipher System
Classical cryptographic methods
1- Transposition Ciphers:
Lecture 5 - Reverse cipher
- Columnar transposition cipher
- Double transposition
Lecture 6 Classical cryptographic methods
Lecture 7 2- Substitution Ciphers
Monoalphabetic cipher
Direct Standard (Caesar Cipher)
Standard Reverse:
Lecture 8
keyword cipher
Multiplicative cipher
Affine cipher
Lecture 9 Classical cryptographic methods
2-Substitution Ciphers
- Polyalphabetic ciphers
Lecture 10 Vigenere cipher
Beaufort Cipher
One time pad
Key stream based ciphers
Lecture 11
- The LFSR key stream Generator
Modern Cryptography
Lecture 12 - Private Key Cipher
- Public Key Cipher
Lecture 13 Data Encryption Standard (DES)
- DES encryption scheme
Lecture 14
- DES decryption
Double DES
Lecture 15
Triple DES
Lecture 16
4 | P a g e
InfoSec Course Book Mr. ReBaz NaJeeb R.
5 | P a g e
InfoSec Course Book Mr. ReBaz NaJeeb R.
Q1/ briefly, mention the main objectives of information security (CIA and
more).
15 marks
Q2/ If you know the keys between a sender and receiver are exchanged,
key1=“kalar” and key2=”hot”. By using double columnar transposition
algorithm, try to encrypt a plaintext which is “I will find him”.
(15 marks)
Q3/ Prove that multiplicative modular inverse of k=9 is 3 (K-1=3) , by using
Extended Euclidean for English language alphabets. Then encrypt this message
=”KPTI” by the given key. (15
mark)
Q4/ Choose the best answer for the following questions (15
marks)
1- Cryptography means
A) Covered meaning B) hidden meaning C) mixed meaning D)
unclear meaning
6 | P a g e
InfoSec Course Book Mr. ReBaz NaJeeb R.
7 | P a g e