0% found this document useful (0 votes)
46 views8 pages

Course Outline (CCS331) - 240902 - 224857

Uploaded by

itshaalol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views8 pages

Course Outline (CCS331) - 240902 - 224857

Uploaded by

itshaalol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

MASENO UNIVERSITY

COURSE OUTLINE

COURSE CODE: CCS 331 ACADEMIC YEAR: 2024/2025

COURSE TITLE: Information System Security and Design

PROGRAMME: BSc. Computer Science

DEPARTMENT: Computer Science

FACULTY / SCHOOL: Computing and Informatics

Lecturer’s Name: Dr. James Obuhuma

Lecturer’s Contacts:
Telephone No. +254710 463 258
Email Address: [email protected]

No. of Units / Contact Hours: 48

Signed by Course Lecturer: …………………………………………………..

Confirmed by Head of Department: …………………………………………


COURSE CODE: CCS 331 COURSE TITLE: Information System Security and Design
Pre-requisite: None Contact Hours: 48
Year of Study: III Semester: I

Purpose of the course:


The course introduces students to the various potential threats and sources of attacks to network security and a
solid understanding of the security mechanisms to maintain security on computer systems and networks.

Expected Learning Outcomes:


By the end of the course, the student should be able to:
1. Recognise various issues related to computer security and network attacks.
2. Assess the risks on a computer system
3. Develop suitable security policies for an organisation and choose appropriate security mechanisms to
ensure data protection.
4. Analyse the capabilities and limitations of current security techniques and protocols, identification and
authentication, access controls, security models.
Course Content / Topics:
Introduction to Computer Security; Security Toolbox; Programming and Programs Security; Web Security;
Operating System Security; Network Security; Database Security; Cloud Computing Security; Privacy;
Management and Incidents; and Security Auditing

Mode of Delivery:
Lectures, assignments and projects

Instructional Materials and Equipment:


Books, Computers, Internet

Course Assessment:
Continuous Assessment Tests 30%
CATs and Assignments - 15%
Take Away or Group Project - 15%

End of Semester Examination 70%


100%

Core References:
1. Charles P. Pfleeger et al. Security Computing, 5th Edition, 2015, Pearson.
2. William S. Effective Cybersecurity: A Guide to Using Best Practices and Standards, 2019, Addison-
Wesley

Recommended Reference Materials:


1. William, S and Lawrie, B. Computer Security Principles and Practice, fourth Edition, 2018, Pearson.
2. Champlain, J. Auditing Information Systems, Second Edition. John Wiley & Sons, 2003.ISBN 0-471-
28117-4
3. Piattini, M. Auditing Information Systems. Idea Group Publishing, 2000. ISBN 1-878289-75-6
4. Cannon, D. Certificed Information Systems Auditor Study Guide, Third Edition. Wiley Publishing,
2011. ISBN 978-0-470-61010-7
5. Hingarh, V and Ahmend, A. Understanding and Conduction Information Systems Auditing. John
Wiley & Sons, 2013.ISBN 978-1-118-34374-6
6. Gulati, V.P. & Dube D. P. Information System Audit and Assurance. Tata McGraw-Hill Publishing
Company Limited, 2005. ISBN 978-0-07-058569-0
7. Springer Journal (Computer Science) – http://www.springer.com/computer/
8. Microsoft Academic Research - http://academic.research.microsoft.com
9. IEEE ICT Publications - http://ieeexplore.ieee.org
10. Association for Computing Machinery - http://www.acm.org/publications/journals
11. ScienceDirect:Computer Science Journals
http://www.sciencedirect.com/science/journals/sub/computerscience

2.0 LECTURE SCHEDULE (HRS)

WEEK ONE TOPIC: Introduction to Computer Security


Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practical (By Lecturer)
Definition of 3 Core Chapter 1: • No lab work Attempt the
Terms; Reference: Introduction exercises at the end
Threats; Text 1 of Chapter 1 of the
Harm; (Pfleeger et Course text:
Vulnerabilitie al., 2015) • The first 2
s; Controls questions will be
submitted for
marking
WEEK TWO TOPIC: Security Toolbox
Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practical (By Lecturer)
Authenticatio 3 Core Chapter 2: No lab work Attempt the
n; Access Reference: Toolbox: exercises at the end
Control; Text 1 Authenticatio of Chapter 2 of the
Cryptography (Pfleeger et n, Access Course text.
al., 2015) Control, and • The first 2
Cryptography questions will be
submitted for
marking

WEEK THREE TOPIC: Programs and Programming


Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practical (By Lecturer)
Non- 3 Core Chapter 3: No lab work Attempt the
malicious Reference: Programs and exercises at the end
programming Text 1 Programming of Chapter 3 of the
oversight; (Pfleeger et Course text.
Malicious al., 2015) • The first 2
code; questions will be
Counter submitted for
measures marking

WEEK FOUR TOPIC: The Web User Side Security


Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practical (By Lecturer)
Browser 3 Core Chapter 4: No lab work Attempt the
Attacks; Web Reference: The Web exercises at the end
attacks Text 1 User Side of Chapter 4 of the
targeting (Pfleeger et Course text.
users; al., 2015) • The first 2
Obtaining questions will be
user or submitted for
website data; marking
E-mail
attacks
WEEK FIVE TOPIC: Operating System Security
Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practicals (By Lecturer)
Security in 3 Core Chapter 5: No lab work Attempt the
operating Reference: Operating exercises at the end
systems; Text 1 System of Chapter 5 of the
Security in (Pfleeger et Course text.
operating al., 2015) • The first 2
system questions will be
design; submitted for
Rootkit marking

WEEK SIX TOPIC: Network Security


Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practicals (By Lecturer)
Network 3 Core Chapter 6: No lab work Attempt the
concepts; Reference: Networks exercises at the end
Network Text 1 of Chapter 6 of the
security (Pfleeger et Course text.
attacks al., 2015) • The first 2
(threats to questions will be
network submitted for
communicati marking
on, Wireless
network
security,
DOS, DDOS;
Strategic
defenses:
cryptography
in networks,
Firewall,
intrusion
detection and
prevention
WEEK SEVEN TOPIC: Database Security
Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practicals (By Lecturer)
Introduction 3 Core Chapter 7: No lab work Attempt the
to database; Reference: Databases exercises at the end
Security Text 1 of Chapter 7 of the
requirements (Pfleeger et Course text.
of databases; al., 2015) • The first 2
Reliability questions will be
and integrity; submitted for
Database marking
Disclosure

WEEK EIGHT TOPIC: Cloud Computing Security


Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practicals (By Lecturer)
Cloud 3 Core Chapter 8: No lab work Attempt the
Computing Reference: Cloud exercises at the end
concepts; Text 1 Computing of Chapter 8 of the
Cloud (Pfleeger et Course text.
security al., 2015) • The first 2
issues; Cloud questions of each
security tools Chapter will be
and submitted for
techniques; marking
Cloud
Identity
management;
Securing
IaaS

WEEK NINE TOPIC: Privacy


Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practicals (By Lecturer)
Privacy 3 Core Chapter 9: No lab work Attempt the
concepts; Reference: Privacy exercises at the end
Privacy Text 1 of Chapter 9 of the
principles (Pfleeger et Course text.
and policies; al., 2015) • The first 2
Authenticatio questions will be
n and submitted for
privacy; marking
Privacy on
web; E-mail
Security;
Privacy
impacts of
emerging
technologies

WEEK TEN TOPIC: Security Management and Incidents


Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practicals (By Lecturer)
Security 3 Core Chapter 10: No lab work Attempt the
planning; Reference: Management exercises at the end
Business Text 1 and Incidents of Chapter 10 of the
Continuity (Pfleeger et Course text.
planning; al., 2015) • The first 2
Handling questions will be
incidents; submitted for
Risk marking.
Analysis;
Dealing with
disaster

WEEK ELEVEN TOPIC: Security Auditing


Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practicals (By Lecturer)
Security 3 Core Chapter 10: No lab work Discussion Activity
Auditing Reference: Management in Class
architecture; Text 1 and Incidents • The Essence of
Security (Pfleeger et Security
Audit Trail; al., 2015) Auditing
Implementin
g the logging
function;
Audit trail
analysis
WEEK TWELVE TOPIC: Effect of Emerging Trends in IT
Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practicals (By Lecturer)
The Internet 3 Any Relevant Any Relevant No lab work Discussion Activity
of Things; Resources Materials in Class
Artificial • The Effect of
Intelligence Current Trends
in IoT and AI on
Information
Systems Security

WEEK THIRTEEN TOPIC: Revision


Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practicals (By Lecturer)
Summary of 3 Core Chapter 1 – No Lab Activity None
the Course Reference: 10
Text 1
(Pfleeger et
al., 2015)

WEEK FOURTEEN – SIXTEEN TOPIC: Final Examination


Sub Topic Hrs Course Text Readings Practicum / Assignment(s) Comments
Lab Practicals (By Lecturer)
Final 3 N/A All content N/A N/A
Examination covered in
the unit

End of Course Remarks / Signatures:


Course Lecturer: …………………………………………………………………………………………….
………………………………………………………………………………………………………………...
………………………………………………………………………………………………………………...

Head of Department: ……………………………………………………………………………………….


………………………………………………………………………………………………………………...
………………………………………………………………………………………………………………...

You might also like