Topic outline

  • General

  • Welcome to information Security Course


    Basic Information:

    • Course Code: CSE 423
    • Program: B.Sc in Computer Science and Engineering
    • Faculty: Science and Information Technology
    • Semester: Fall
    • Year: 2022
    • Credit: 3.0
    • Contact Hour: 3 Hours/Week
    • Course Category: Core Engineering  

     

    Course Objectives:

    To provide a solid conceptual understanding of the fundamentals of information security. More specifically,

    • To learn the basic concepts of information security
    • To learn the types of Cybercrime and Attacks.
    • To learn the value of information to the modern organization.
    • To learn company Policies and Strategies to mitigate security problems.
    • To learn CIA triad of Confidentiality, Integrity and Availability.
    • To learn the human role in security systems with an emphasis on ethics, social engineering vulnerabilities and training.

     

    Course Outcomes (CO's):

    CO1    Interpret the components, tools and techniques of Information Security systems
    CO2 Analyze and resolve security issues in networks and computer systems to secure an IT infrastructure
    CO3 Learn to Develop policies and procedures to manage enterprise security risks.
    CO4

    Interpret and forensically investigate security incidents.



    Assessment Strategies:


    Attendance 07%
    Class Test / Quiz (Average of 3) 15%
    Assignment 05%
    Presentation 08%
    Midterm Examination 25%
    Final Examination 40%
    Total:  100%

  • Week - 1: Information Security and It's Element


    Discussion Points: 

          • Define Security Information Security
          • Discuss Various Elements of Information Security
          • Discuss Various Information Security Attacks

    Expected Learning Outcomes:

          • Recognize the concept of CIA triad
          • Identify various kinds of Attacks

    Resources of Learning:

  • Week - 2: Ethical hacking and concept


    Discussion Points: 

          • What is hacking
          • Types of hacker
          • Hacker Classes
          • Cyber Attack
          • Cyber Security vs Information Security
          • Art and philosophy of hackers

    Expected Learning Outcomes:

          • Recognize the hackers
          • Find out how a hacker hacks the system
          • Differentiate between black hat, white hat, and gray hat
          • Learn about cyber attack

    Resources of Learning:


  • Week - 3: Security Risk Management

    Security

    Discussion Points: 

          • Discussion on Information Assurance
          • Discussion about Risk, Risk Management and Risk Level
          • Identification of Assets, Key Risk Indicators, Risk Scenarios 
          • Discuss on Relationship between Vulnerabilities and Risk Scenarios based on Assets

    Expected Learning Outcomes:

          • Recognize the concept of Information Assurance
          • Identify which one is assent, Risk level, and Key Risk Indicators 
          • Appreciate the relationship between Vulnerabilities and Risk Scenarios based on Assets

    Resources of Learning:


  • Week - 4


    Discussion Points: 

          • Concept of Line Coding, Block Coding and Scrambli

    Expected Learning Outcomes:

          • Recognize the digital transmission technologies used for modern communication.
          • Identify and differentiate among various digital to digital, analog to digital conversion techniques.
          • Appreciate what important role transmission modes play in digital communication.

    Resources of Learning:


    Assignment: 

  • Week - 5:


    Discussion Points: 

          • Demonstration of Wavelength Division Multiplexing (WDM) and its applications
          • Demonstration of Time Division Multiplexing (TDM) and its applications
          • Discussion on Data rate management

    Expected Learning Outcomes:

          • Identify, deployment and differentiate among WDM and TDM and their alternatives.
          • Role of Multiplexing in modern communication systems through data rate management


  • Week - 6:

            

    Discussion Points: 

          • What is Incident
          • Incident Management
          • Incident handling and Response 


    Expected Learning Outcomes:

          • Learn to identify incidents and handle incident

    Resources of Learning:

    • Quiz 1 for Section F
      Opened: Thursday, 15 September 2022, 8:00 PM
      Closed: Thursday, 15 September 2022, 8:30 PM
      Restricted Not available unless: You belong to Section-F
    • Quiz 1 for Section H
      Opened: Thursday, 15 September 2022, 8:00 PM
      Closed: Thursday, 15 September 2022, 8:30 PM
      Restricted Not available unless: You belong to Section H
    • Quiz 1 for Section I
      Opened: Thursday, 15 September 2022, 8:00 PM
      Closed: Thursday, 15 September 2022, 8:30 PM
      Restricted Not available unless: You belong to Section I
    • Opened: Monday, 26 September 2022, 10:00 PM
      Closed: Monday, 26 September 2022, 10:25 PM
  • Week - 6


    Discussion Points: 


    Expected Learning Outcomes:




    Resources of Learning:

  • Week 8


    Discussion Points: 

          • Review of Midterm Questions
          • Concept of Multiplexing
          • Demonstration of Frequency Division Multiplexing and its applications

    Expected Learning Outcomes:

          • Recognize the multiplexing technologies used for modern communication.
          • Identify and deployment of frequency division multiplexing techniques and alternatives.

    Resources of Learning:

  • Week 9 : Review of Previous Weeks


    Discussion Points: 

          • Introduction Error and types of errors, Concept of Redundancy. 
          • Introduces the concept of Hamming Distance.
          • Discission about CRC and How it can be implemented in Hardware.

    Expected Learning Outcomes:

          • Determine the types of errors that occur in modern communication channels and devices.
          • Identify, deployment and differentiate between Hamming Distance and CRC and their real-time applications.

    Resources of Learning:

    • Quiz for Section F
      Opened: Monday, 10 October 2022, 8:00 PM
      Closed: Monday, 10 October 2022, 8:20 PM
      Restricted Not available unless: You belong to Section-F
    • Quiz for Section G
      Opened: Monday, 10 October 2022, 8:00 PM
      Closed: Monday, 10 October 2022, 8:20 PM
      Restricted Not available unless: You belong to Section G
    • Quiz for Section H
      Opened: Monday, 10 October 2022, 8:00 PM
      Closed: Monday, 10 October 2022, 8:20 PM
      Restricted Not available unless: You belong to Section H
    • Quiz for Section I
      Opened: Monday, 10 October 2022, 8:00 PM
      Closed: Monday, 10 October 2022, 8:20 PM
      Restricted Not available unless: You belong to Section I
  • Week - 10: Problem Solving


    Discussion Points: 

          • Representation of CRC as Polynomials
          • Introduction of Checksum (Traditional and Complementary)

    Expected Learning Outcomes:

          • Identify, deployment and differentiate between CRC (Polynomials) and Checksum and their real-time applications.
          • Appreciate the role of error correction in communication.

    Resources of Learning:

          • Lecture Video

  • Week - 11: Midterm Exam



    Contents for Exam:

    • Week - 12: Personal Device Security


      Discussion Points: 

            • What is Antivirus
            • Features of Antivirus
            • How does antivirus work?
            • What is firewall
            • Types of Firewall
            • Firewall vs Antivirus
            • IDS, IPS and Honeypot

      Expected Learning Outcomes:

            • Learn about antivirus, firewall, IDS and IPS
            • Learn about mobile security, Cloud Security and IoT security

      Resources of Learning:

      • Recorded Video for Section G Part 1 URL
        Restricted Not available unless: You belong to Section G
      • Recorded Video for Section H Part 1 URL
        Restricted Not available unless: You belong to Section H
      • Recorded Video for Section F Part 1 URL
        Restricted Not available unless: You belong to Section-F
      • Recorded Video Section I part 1 URL
        Restricted Not available unless: You belong to Section I
      • Recorded Video for Section G part 2 URL
        Restricted Not available unless: You belong to Section G
      • Recorded Video for Section H Part 2 URL
        Restricted Not available unless: You belong to Section H
      • Recorded Video for Section I Part 2 URL
        Restricted Not available unless: You belong to Section I
      • Recorded Video for Section F part 2 URL
        Restricted Not available unless: You belong to Section-F
    • Presentation Submission

      Week 13 : Presentation 


    • Week - 14:



      Discussion Points: 

            • Discussion about Channelization protocols. (FDMA, TDMA, and CDMA)
            • Review of the previously selected (based on the discussion in the forum) contents

      Expected Learning Outcomes:

            • Implementation of CDMA in cellular telephony
            • Impletemtion of reviewed topics

      Resources of Learning:

    • Week 15


      Discussion Points: 

            • Discussion about  System Hacking
            • Discussion on Footprinting and Scanning

      Expected Learning Outcomes:

            • Learn about Phases of  System hacking

      Resources of Learning:

      • Opened: Monday, 12 December 2022, 9:00 PM
        Closed: Monday, 12 December 2022, 9:20 PM
      • Recorded Video for Section F URL
        Restricted Not available unless: You belong to Section-F
    • Week 16



      Discussion Points: 

            • Discussion Cryptography
            • Discussion on Cyber Law

      Expected Learning Outcomes:

            • Learn about  Cryptography and Cyber Law

      Resources of Learning:

    • Week - 14: Final Exam

      How to continue using DDI: Final Assessment - KNILT


      Final Assessment Contents:


              • Modulation technique
              • Implementation of FDM, TDM and Data Rate Management
              • Hamming Distance, CRC and Checksum
              • ALOHA, CSMA/CA, CSMA/CD, Reservation, Polling, Token Passing, CDMA
              • Connected Device -Chapter 17

    • Topic 20