Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Methods of Instructions: Direct Instruction, Individual & Group Work, and Tutorials /

Handouts

Readings
 Compilers: Principles, Techniques, and Tools is a famous computer science textbook by
Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman about compiler construction. Although
decades have passed since the publication of the first edition, it is widely regarded as the
classic definitive compiler technology text
 Theory and Practice of Compiler Writing by Jean Paul Tremblay and Paul G. Sorenson,
McGraw-Hill International Editions

RCS 305 COMPUTER SYSTEM SECURITY

Course Status: Core


Credit Rating: 8 credits
Total hours spent: 80 credit hours
Lecture hours=30, Tutorial/seminar hours=15, Assignment hours=10, Independent study
hours=5, Field/practical hours=20

Course Aim:
This course aims to teach students the principles of computer security from an applied viewpoint
and provides hands-on experience on security threats and countermeasures.

Learning outcomes:
At the end of this course the student should be able to:
1. To understand the computer System vulnerabilities
2. To understand human weaknesses to computer system security
3. To Prevent, Detect, and Recover

COURSE CONTENTS
1. Code execution vulnerabilities (buffer overflow, sandboxing, mobile code)
2. Conventional Encryption: Conventional encryption model, Stegnography, Data
Encryption Standard, block cipher, Encryption algorithms, confidentiality, Key
distribution.
3. Malware (Trojans, viruses, and worms),
4. Access control (users, roles, policies),
5. Cryptosystems (hashing, signatures, certificates)
6. Network security (firewalls, TLS, intrusion detection, VPN)
7. Human and social engineering
8. Digital rights management

Assessment:
1. Formative assessment: Involve quiz, test, assignment and presentation which carries 40%
as stated in RUCU prospectus.
2. Summative assessment: This includes end of semester examination which Carries 60%.

Methods of Instructions: Direct Instruction, Individual & Group Work, and Tutorials /
Handouts

Readings
 Kahate, A. (2013). Cryptography and network security. Tata McGraw-Hill Education.
 Stallings, W. (2006). Cryptography and network security: principles and practices.
Pearson Education India.
 Forouzan, B. A., & Mukhopadhyay, D. (2011). Cryptography and Network Security
(Sie). McGraw-Hill Education.
 Stinson, D. R. (2005). Cryptography: theory and practice. CRC press.
 William Stallings, 2006, "Cryptography and Network security",2nd Edition, Prentice Hall
of India, New Delhi,

You might also like