Information Security
BESE-27
Anum Hasan
Introduction
• Anum Hasan
• MSIS-Bahria university
• PhD IS- SEECS, NUST(On going)
• Email: anum.hasan@mcs.nust.edu.pk
• Office: Faculty Office, Nasim Rana Block
Course Objective
• Describe concepts of information security
effectively.
• Analyze real-world scenarios from an
information security perspective and model
them using different security measures.
• Understanding the security policies and
standards for the effective implementation
and enforcement within organizations.
CLO Statements
At the end of the course, the students will be able to Domain BT PLO
attain the CLOs given below:
Describe concepts of information security Cognitive 2 1
effectively.
Analyze real-world scenarios from an information Cognitive 3 2
security perspective and model them using
different security measures.
Identify appropriate techniques to tackle and Cognitive 4 2
solve problem in the domain of information
security.
Course Topics to be covered
• Intro to IS
• Need and planning for Security
• Risk management
• Legal issues
• Browser security
• Database security
• Cloud Security
• Access control
Recommended Books
Text Principles of Information Security, Michael E.
Book:
Whitman and Herbert J. Mattord, latest Edition,
Cengage Learning.
Referen Security in Computing, Pfleeger, C.P., Pfleeger, S.L. &
ce Margulies, J., latest Edition, Prentice Hall.
Books: In addition there will be lecture notes and selected
articles.
Grading Policy
Assessments/CLOs CLO1 CLO2 CLO3
Quizzes: 10% √ √ √
Assignments: 10% √ √ √
Midterm: 30% √ √
Semester Project: 10% √ √ √
End Semester Exam:40% √ √ √
Class Conduct
• No late submissions of assignments and project will
be accepted
• No use of mobile phones during lecture
• Attendance can be marked anytime
• No tolerance for late comers
• No retake of quizzes and assignments
• Copied assignment will be marked zero