0% found this document useful (0 votes)
5 views8 pages

Is Introduction

The document outlines the course on Information Security led by Anum Hasan, detailing its objectives, course topics, and grading policy. Students will learn to describe information security concepts, analyze real-world scenarios, and identify techniques for problem-solving in this domain. The course includes assessments such as quizzes, assignments, and exams, with strict conduct rules regarding submissions and attendance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views8 pages

Is Introduction

The document outlines the course on Information Security led by Anum Hasan, detailing its objectives, course topics, and grading policy. Students will learn to describe information security concepts, analyze real-world scenarios, and identify techniques for problem-solving in this domain. The course includes assessments such as quizzes, assignments, and exams, with strict conduct rules regarding submissions and attendance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Information Security

BESE-27

Anum Hasan
Introduction

• Anum Hasan
• MSIS-Bahria university
• PhD IS- SEECS, NUST(On going)
• Email: anum.hasan@mcs.nust.edu.pk
• Office: Faculty Office, Nasim Rana Block
Course Objective

• Describe concepts of information security


effectively.
• Analyze real-world scenarios from an
information security perspective and model
them using different security measures.
• Understanding the security policies and
standards for the effective implementation
and enforcement within organizations.
CLO Statements
At the end of the course, the students will be able to Domain BT PLO
attain the CLOs given below:

Describe concepts of information security Cognitive 2 1


effectively.

Analyze real-world scenarios from an information Cognitive 3 2


security perspective and model them using
different security measures.

Identify appropriate techniques to tackle and Cognitive 4 2


solve problem in the domain of information
security.
Course Topics to be covered

• Intro to IS
• Need and planning for Security
• Risk management
• Legal issues
• Browser security
• Database security
• Cloud Security
• Access control
Recommended Books

Text Principles of Information Security, Michael E.


Book:
Whitman and Herbert J. Mattord, latest Edition,
Cengage Learning.

Referen Security in Computing, Pfleeger, C.P., Pfleeger, S.L. &


ce Margulies, J., latest Edition, Prentice Hall.
Books: In addition there will be lecture notes and selected
articles.
Grading Policy

Assessments/CLOs CLO1 CLO2 CLO3

Quizzes: 10% √ √ √

Assignments: 10% √ √ √

Midterm: 30% √ √

Semester Project: 10% √ √ √

End Semester Exam:40% √ √ √


Class Conduct

• No late submissions of assignments and project will


be accepted
• No use of mobile phones during lecture
• Attendance can be marked anytime
• No tolerance for late comers
• No retake of quizzes and assignments
• Copied assignment will be marked zero

You might also like