0% found this document useful (0 votes)
30 views2 pages

Syllabus

This document outlines the topics covered in a course on computer and information security. The course covers introduction to security concepts like cryptography, access control, and protocols. It then delves deeper into specific topics like symmetric and public key cryptography, hash functions, access control models, authentication protocols, software security issues, and operating system security functions. The goal is to provide students a comprehensive overview of key concepts in IT and information security.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views2 pages

Syllabus

This document outlines the topics covered in a course on computer and information security. The course covers introduction to security concepts like cryptography, access control, and protocols. It then delves deeper into specific topics like symmetric and public key cryptography, hash functions, access control models, authentication protocols, software security issues, and operating system security functions. The goal is to provide students a comprehensive overview of key concepts in IT and information security.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

ITM 604/ EWT 616.

2: Computer and Information Security [L-T-P-C: 3-0-0-3]


1. Introduction Introduction to IT security, Cryptography, access control, Protocols, Software. 2. Cryptography basics Simple Substitution Cipher, Double Transposition Cipher, Codebook, Cipher, A Taxonomy of Cryptography and Cryptanalysis. 3. Symmetric Key Cryptography Introduction, Stream Ciphers, Block Ciphers, Integrity 4. Public Key Cryptography Knapsack, RSA, Diffie-Hellman, Elliptic Curve Cryptography, Public Key Notation, Uses for Public Key Cryptography, Public Key Infrastructure. 5. Hash Functions Introduction, The Birthday Problem, Non-Cryptographic Hashes, Tiger Hash, Uses of Hash Functions. 6. Access Control Introduction, Authentication Methods, Passwords, Biometrics, TwoFactor Authentication, Single Sign-On and Web Cookies. 7. Authorization Introduction, Access Control Matrix, Multilevel Security Models, Multilateral Security, Covert Channel, Inference Control, Firewalls, Intrusion Detection 8. Simple Authentication Protocols and Real World Security Protocols Simple Security Protocols, Authentication Protocols, Authentication and TCP, Zero Knowledge Proofs, Secure Socket Layer, IPSec, Kerberos, GSM. 9. Software Flaws/Malware and Insecurity in Software

Software Flaws, Malware, Miscellaneous Software-Based Attacks, Software Reverse Engineering, Software Tamper Resistance, Digital Rights Management 10. Operating Systems Security Operating System Security Functions, Trusted Operating System, Next Generation Secure Computing Base

Reference Books Information Security : Principles and Practices by Mark Stamp

You might also like