Lahore College for Women University
Department Of Computer Science
Course Outline (Weekly Plan)
CS-425 Information Security
Credit Hours 3 (3-0)
Program: BS-CS Semester: VIII
Pre Requisite : Computer Networks course Follow Up: None
Course Description
Information Security (3 semester hours) is a comprehensive study of the principles and practices of
computer system security including operating system security, network security, software security and web
security. The objective of this course is to provide a foundation of network related security issues. It builds
upon concepts of security such as confidentiality, integrity and authentication and on cryptography. Key
topics include security architecture, cryptographic systems, and security management tools. Specifically,
will study major security protocols and standards, network attacks and defenses, database security, virus,
malware, denial of service, firewalls, intrusion detection, and wireless security.
Course Objectives
This course is designed to understand major cryptographic systems and how they are applied inside a
computer network system and how to strategically design, implement, and maintain firewalls based on a
network's architecture and associated variables. Identify the different types of access control and site
security methods. Understand various attack methods used to target and exploit computer systems and
networks
Learning Outcomes
The learning outcome is students shall be able to understand what are the common threats faced today,
what are the foundational theory behind information security, what are the basic principles and techniques
when designing a secure system, how to think adversarially, how today's attacks and defenses work in
practice.
Be able to understand and explain concepts relating to protection of information systems against
unauthorized access to or modification of information in its various forms.
Textbooks
Cryptography and Network Security: Principles and Practice (6th Edition) by William Stallings
Security in Computing (4th Edition) by Charles P. Pfleeger, Shari Lawrence Pfleeger
Reference Books / Material
Computer Security: Art and Science, Matthew Bishop
Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, George Kurtz. 2003
Introduction to Network Security, by D. Jacobson, Chapman and Hall, 2009
Papers from conferences and journals
Papers (required reading)
Selected research papers & technical specifications (will be itemized in class)
Course Distribution Theory: 30%
Problem Analysis: 20%
Solution Design: 45%
Social and Ethical Issues: 5%
Marks Distribution Test1:10 Marks,Test 2: 10Marks,Assignment:05Marks, Quiz: 5 Marks, FinalTerm:
55 Marks No Choice 03 hours, Practical:10 Marks, Attendance: 5 Marks
Technology Involved Multimedia, Web
Practiced Techniques Class Room Lecture, Presentation, Group Discussion
Lahore College for Women University
Department Of Computer Science
Course Outline (Weekly Plan)
Theory
Week Topic Recommendation of
Learning Activities
(Assignments,
Quizzes, Case study,
or reading
assignment)
1 Introduction: Basic Security Concepts, Network Security, Goals of
Security, OSI Security Architecture.
2 Security Attacks, Classes of Threats, Policies, Services & Mechanisms,
Network Security Model
3 Cryptography & basic terminologies, Symmetric Cipher Model,
Classical Ciphers, Ceasar Cipher, HillCipher, Row Transposition
Ciphers, Playfair Ciphier. Quizzes &
Assignments
4 Symmetric Key Cryptography, Feistel Cipher, Data Encryption
Standard basics, rounds,e-box, s-box, p-box, key box.
5 Public Key Cryptography requirements, Deffie-Hellman Key Exchange.
6 RSA Algorithm
7 Chinese Remainder Theorem
8 Needham Schroder, Key Management Distribution, KDC, CRM
9 Digital Signature, Characteristics, MACs, One-way Hash function,
Signing & Verification, Birthday Attack.
Public Key Certificates. Man-in-the-middle
10 Authentication Applications
11 Authorization and Access Control, ACLs Quiz
12 Audit Mechanisms, Intrusion detection, Password Management
13 General principles of system security, IP Security
14 Network-based security issues, operational security issues;
physical security issues.
15 Malicious Software, Physical threats, legal and ethical issues in
computer security
16 Firewalls, Internet Security Policy, Design Goals, Controls, Packet Assignment
Filtering Router, Limitations, Application Level Gateway, Circuit Level
Gateways, Firewall Architecture.
End Term Exam