Topic outline

  • Welcome Announcement

    Instructor's Information:
    Instructor Name:       Afjal Hossan Sarower
    Designation:               Lecturer

    Email:                        afjal.cse@diu.edu.bd

    Dear Students
    Welcome to your Information Security class. We'll discuss our class, generate ideas and solve our problem through this platform. Hope you'll have a great Experience. 
    Good Luck!!! 


  • Task and Home Work

  • Welcome to Information Security Course



    Basic Information:

    Course Code: CSE 423
    Course Title: Information Security
    Program: B.Sc in Computer Science and Engineering
    Faculty: Science and Information Technology
    Semester: Fall; Year: 2022
    Credit: 3.0; Contact Hour: 3 Hours/ Week
    Course Category: Core Engineering

    Course Instructor:

    Afjal H. Sarower
    Lecturer
    Office: Room #317/ Desk10 ,AB4 Building, Daffodil Smart City
    Cell Number# +880 1869045878

    Email: afjal.cse@diu.edu.bd

    Counselling Hour: Email for appointment 


                            

     

    Course Rationale:

    Information security — or infosec —  is the protection of information by people and organizations in order to keep information safe for themselves, their company, and their clients.Every organization needs protection against cyber attacks and security threats. Cybercrime and malware are constant threats to anyone with an Internet presence, and data breaches are time-consuming and expensive.The goal of IT security is to protect these assets, devices and services from being disrupted, stolen or exploited by unauthorized users, otherwise known as threat actors.


     

    Course Objectives:

    To provide a solid conceptual understanding of the fundamentals of Information Security. More specifically,

    • To learn the basic concepts of Information Security.
    • To learn the types of Cybercrime and Attacks.
    • To learn the value of information to the modern organisation.
    • To learn company Policies and Strategies to mitigate the security problems.
    • To learn CIA triad of Confidentiality, Integrity and Availability.
    • To learn the human role in security systems with an emphasis on ethics, social engineering vulnerabilities and training.

     

    Course Outcomes (CO's):

    CO1       Interpret the components, tools and techniques of Information Security systems

    CO2       Analyze and resolve security issues in networks and computer systems to secure an IT infrastructure

    CO3       Learn to Develop policies and procedures to manage enterprise security risks.

    CO4       Interpret and forensically investigate security incidents.


    Assessment Strategies:


  • Week - 1: Information Security and It’s Elements


    week1

    Discussion Points: 

          • Concept of protocol layering using scenarios.
          • Discussion about the seven layers of the OSI Model.
          • Addressing mechanism of each layer.

    Expected Learning Outcomes:

          • Recognize the networking models used for seamless communication among computer user.
          • Find out how layered model communication functions can be organized and be very successful in communication.
          • Differentiate between OSI and TCP/IP models.

    Resources of Learning:



  • Week - 2: Ethical Hacking and Concept

    week2

    Discussion Points: 

          • Concept of data and signal of analog and digital.
          • Discussion about transmission impairments (attenuation, distortion, and noise)
          • Calculate the performance of data transmission including bandwidth, throughput, latency, and jitter. 

    Expected Learning Outcomes:

          • Recognize the concept of analog and digital signals and their use in day to day communication.
          • Identify which transmission impairments cause problems in communication and their remedies.
          • Appreciate the importance of date rate limits in communication and performance measurement.

    Resources of Learning:

  • Week - 3: Security Risk Management

    week3

    Discussion Points: 

          • Concept of Line Coding, Block Coding and Scrambling.
          • Discuss and Illustrate the Digital to Digital Conversion Techniques
          • Discuss and Illustrate the Analog to Digital Conversion Techniques
          • Discussion about Transmission Modes

    Expected Learning Outcomes:

          • Recognize the digital transmission technologies used for modern communication.
          • Identify and differentiate among various digital to digital, analog to digital conversion techniques.
          • Appreciate what important role transmission modes play in digital communication.

    Resources of Learning:

  • Week - 4: Security Risk Management(Contd.)

    week4

    Discussion Points: 

          • Discuss and Illustrate the Digital to Analog Conversion Techniques
          • Discuss and Illustrate the Analog to Analog Conversion Techniques

    Expected Learning Outcomes:

          • Recognize the analog transmission technologies used for modern communication.
          • Identify and differentiate among various digital to analog, analog to analog conversion techniques.
          • Appreciate what important role modulation techniques play in communication.

    Resources of Learning:

  • Week - 6: Review of Previous Weeks

    week6

    Discussion Points: 

          • Review the difficult topics of previous weeks specifically, Signal conversions and performance measurement

    Expected Learning Outcomes:

          • Design and Illustrate various signal conversion techniques based on the problem given
          • Gain the ability to calculate the performance of a system based on different parameters.


  • Week - 7: Midterm Exam



    Contents for Exam:

            • Topologies
            • TCP/IP
            • Transmission Impairments and Performance Analysis
            • Signal Conversions
            • Modulation Techniques

  • Week - 8: Incident Management and AI and ML in Information Security

    week8

    Discussion Points: 

          • Demonstration of Wavelength Division Multiplexing (WDM) and its applications
          • Demonstration of Time Division Multiplexing (TDM) and its applications
          • Discussion on Data rate management

    Expected Learning Outcomes:

          • Identify, deployment and differentiate among WDM and TDM and their alternatives.
          • Role of Multiplexing in modern communication systems through data rate management

    Resources of Learning:

  • Topic 14