CSNC3413 Information Security Fall2024
CSNC3413 Information Security Fall2024
PROGRAM (S) TO BE
BSCS
EVALUATED
A. Course Description
Course Code CSNC 3413
Course Title Information Security
Credit Hours 3(3-0)
Prerequisites by Course(s) and Knowledge of information technology fundamentals (computer application,
Topics operating systems, applications, and networking) is required, or permission of
the instructor is also required.
Assessment Instruments with Quizzes: 10%
Weights (homework, quizzes, Assignments: 15%
midterms, final, programming Class Participation: 10%
assignments, lab work, etc.) Mid Term: 25%
Final: 40%
Semester 6&7
Course Instructor (s) Mahwish Shahid
Course Instructor Email [email protected]
Course Coordinator Dr Ghulam Mustafa
Course Coordinator Email [email protected]
Office Hours Monday (02:00 PM - 03:00 PM), Tuesday (02:00 PM - 03:00 PM)
Office Location Sports Building (Gym Faculty), 2nd floor, Cabin no.13
Plagiarism Policy Cheating and plagiarism will not be tolerated in any course offered
by UCP. Such activities/behavior will result in no credit for the
assignment or examination and may lead to disciplinary actions.
Please take the time to review the Rules & Regulations :
https://ucp.edu.pk/rules-regulations/
Course Description Students take this course to study the fundamentals of information security,
both from a managerial and technological standpoint. Students gain an
understanding of the various types of security incidents and assaults as well as
techniques for preventing, detecting, and responding to such events.
Additionally, students will study the fundamentals of using cryptography, a
critical technology for implementing security features. Teams of students will
present their research projects on subjects linked to information security at the
final session.
1 NCEAC.FORM.001.C
Course Objectives To learn how to describe different information security threats and
countermeasures.
To learn how to assess security issues and create defenses.
To learn how to describe the response to an information security event.
To be able to describe how Common Key and Public Key cryptography
are used.
To be able to describe the mechanism used to safeguard the privacy and
accuracy of data.
Textbook (or Laboratory Manual for Computer Security Fundamentals, 3rd edition by William Easttom
Laboratory Courses) Cryptography and Network Security: Principles and Practice 7th Edition
by William Stallings (Author)
Computer Security: Principles and Practice, 3rd /4th Edition by William
Stallings (Author), Lawrie Brown (Author)
Security in computing, Charles P. Pfleeger and Shari Lawrence Pfleeger
(2015), 5th edition, Prentice Hall, ISBN-13: 978-0132390774.
Understanding Cryptography, Christof Paar and Jan Pelzl (2009), 1st
edition, Springer Publishing Company, ISBN: 3642041000
9783642041006.
Reference Material Official (ISC)2 Guide to the CISSP CBK, 3rd edition
Principles of Information Security, Michael E. Whitman, and Herbert J.
Mattord, Cengage Learning, ISBN: 1285448367
Understand cryptography in-depth, Christof Paa and Jan Pelzl, Springer,
ISBN: 3642041000
Security Engineering, a guide to building dependable distributed
systems, Ross J. Anderson (2020), 3rd Edition, Wiley Publications.
Building secure software, John Viega, and Gary McGraw (2011), How
to avoid security problems the right way, Addison-Wesley Professional
Computing Series, 1st edition, ISBN-13: 978-0321774958.
Applied Cryptography, Bruce Schneier, Protocols, Algorithms, and
Source Code in C, 2nd Edition, Wiley, ISBN-13: 978-0471117094.
Programming Assignments Done in N/A
the Course
Class Time Spent on (in credit hours) Theory
3ch
Oral and Written Communications Yes
2 NCEAC.FORM.001.C
Lec References CLO
We Evaluation
tur Topics Covered
ek Instrument
e
3 NCEAC.FORM.001.C
Euclidian and Extended Euclidian
Algorithm
15. Revision
8
16. Review
5 NCEAC.FORM.001.C