0% found this document useful (0 votes)
48 views1 page

Information Security

Uploaded by

Assad Leo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views1 page

Information Security

Uploaded by

Assad Leo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Course Name: Information Security

Course Structure: Lectures: 3 / Labs: 0 Credit Hours: 3


Prerequisites: Data Communication and Computer Networks
Objectives:
Course Outline:
Basic notions of confidentiality, integrity, availability; authentication models; protection
models; security kernels; Encryption, Hashing and Digital 33 Signatures; audit; intrusion
detection and response; database security, host based and network-based security issues
operational security issues; physical security issues; personnel security; policy formation
and enforcement; access controls; information flow; legal and social issues; identification
and authentication in local and distributed systems; classification and trust modeling; risk
assessment
Reference Material:
1. Computer Security: Art and Science, Matthew Bishop
2. Cryptography and Network Security by William Stalling 6th Edition, 2012
3. Principles of Information Security 3rd E by Michael E. Whitman and Herbert J. Mattord

You might also like