Topic outline

  • Welcome Announcement


    Dear Students
    Welcome to your Information Security class. We'll discuss our class, generate ideas and solve our problem through this platform. Hope you'll have a great Experience. 
    Good Luck!!! 


    • Welcome to Information Security Course



      Basic Information:

      Course Code: CSE 423
      Course Title: Information Security
      Program: B.Sc in Computer Science and Engineering
      Faculty: Science and Information Technology
      Semester: Fall; Year: 2022
      Credit: 3.0; Contact Hour: 2 Hours/ Week
      Course Category: Core Engineering

      Course Instructor:

      Lamia Rukhsara
      Lecturer
      Office: Room #705, AB4 Building, Daffodil Smart City
      Cell Number# +880 1819652162

      Email: lamia.cse@diu.edu.bd

      Counselling Hour: Sunday-Wednesday (10:00AM -4:00 PM)

      Click the Link to set a time!!!


                              

       

      Course Rationale:

      Information security — or infosec — is the protection of information by people and organizations in order to keep information safe for themselves, their company, and their clients. Every organization needs protection against cyber-attacks and security threats. Cybercrime and malware are constant threats to anyone with an Internet presence, and data breaches are time-consuming and expensive. The goal of IT security is to protect these assets, devices and services from being disrupted, stolen or exploited by unauthorized users, otherwise known as threat actors.


       

      Course Objectives:

      To provide a solid conceptual understanding of the fundamentals of Information Security. More specifically,

      -To learn basics of information security, in both management aspect and technical aspect.

      -To learn various types of security threats and attacks

      -To learn basics of Security risks and Management process

      -To learn ways to manage, detect and response to incidents and attacks.

      -To learn the benefits of AI and ML in the field of Information Security

      -To learn basics of application of cryptography which are one of the key technology to implement security  functions.                                        

      -To learn the Legal and Ethical issues in information security

      Course Learning Outcomes (CLO's):

      CLO1

      Interpret the components, tools and techniques of Information Security systems

      CLO2

      Analyze various Information security threats, risks and propose controls for it.

      CLO3

      Explain the Ethical issues and Laws in the field of Information Security

       

      Assessment Strategies:


    • Week - 1: Information Security and It’s Elements


      week1

      Discussion Points: 

            • Concept of protocol layering using scenarios.
            • Discussion about the seven layers of the OSI Model.
            • Addressing mechanism of each layer.

      Expected Learning Outcomes:

            • Recognize the networking models used for seamless communication among computer user.
            • Find out how layered model communication functions can be organized and be very successful in communication.
            • Differentiate between OSI and TCP/IP models.

      Resources of Learning:



    • Week - 2: Ethical Hacking and Concept

      week2

      Discussion Points: 

            • Concept of data and signal of analog and digital.
            • Discussion about transmission impairments (attenuation, distortion, and noise)
            • Calculate the performance of data transmission including bandwidth, throughput, latency, and jitter. 

      Expected Learning Outcomes:

            • Recognize the concept of analog and digital signals and their use in day to day communication.
            • Identify which transmission impairments cause problems in communication and their remedies.
            • Appreciate the importance of date rate limits in communication and performance measurement.

      Resources of Learning:

    • Week - 3: Security Risk Management

      week3

      Discussion Points: 

            • Concept of Line Coding, Block Coding and Scrambling.
            • Discuss and Illustrate the Digital to Digital Conversion Techniques
            • Discuss and Illustrate the Analog to Digital Conversion Techniques
            • Discussion about Transmission Modes

      Expected Learning Outcomes:

            • Recognize the digital transmission technologies used for modern communication.
            • Identify and differentiate among various digital to digital, analog to digital conversion techniques.
            • Appreciate what important role transmission modes play in digital communication.

      Resources of Learning:

      • Assignment-1
        Opened: Saturday, 25 February 2023, 12:00 AM
        Due: Saturday, 4 March 2023, 12:00 AM
        Restricted Not available unless: You belong to SEC-54E
      • Assignment-1
        Opened: Saturday, 25 February 2023, 12:00 AM
        Due: Saturday, 4 March 2023, 12:00 AM
        Restricted Not available unless: You belong to SEC-54PCA
      • Assignment-1
        Opened: Saturday, 25 February 2023, 12:00 AM
        Due: Saturday, 4 March 2023, 12:00 AM
        Restricted Not available unless: You belong to SEC-54PCB
      • Assignment-1
        Opened: Saturday, 25 February 2023, 12:00 AM
        Due: Saturday, 4 March 2023, 12:00 AM
        Restricted Not available unless: You belong to SEC-55A
      • Assignment-1
        Opened: Saturday, 25 February 2023, 12:00 AM
        Due: Saturday, 4 March 2023, 12:00 AM
        Restricted Not available unless: You belong to SEC-55B
      • Assignment-1
        Opened: Saturday, 25 February 2023, 12:00 AM
        Due: Saturday, 4 March 2023, 12:00 AM
        Restricted Not available unless: You belong to SEC-55C
    • Week - 4: Security Risk Management(Contd.)

      week4

      Discussion Points: 

            • Discuss and Illustrate the Digital to Analog Conversion Techniques
            • Discuss and Illustrate the Analog to Analog Conversion Techniques

      Expected Learning Outcomes:

            • Recognize the analog transmission technologies used for modern communication.
            • Identify and differentiate among various digital to analog, analog to analog conversion techniques.
            • Appreciate what important role modulation techniques play in communication.

      Resources of Learning:

    • Week - 6: Review of Previous Weeks

      week6

      Discussion Points: 

            • Review the difficult topics of previous weeks specifically, Signal conversions and performance measurement

      Expected Learning Outcomes:

            • Design and Illustrate various signal conversion techniques based on the problem given
            • Gain the ability to calculate the performance of a system based on different parameters.


    • Week - 7: Risk Management



      Contents for Exam:

              • Topologies
              • TCP/IP
              • Transmission Impairments and Performance Analysis
              • Signal Conversions
              • Modulation Techniques

    • Week - 8: Incident Management and AI and ML in Information Security

      week8

      Discussion Points: 

            • Demonstration of Wavelength Division Multiplexing (WDM) and its applications
            • Demonstration of Time Division Multiplexing (TDM) and its applications
            • Discussion on Data rate management

      Expected Learning Outcomes:

            • Identify, deployment and differentiate among WDM and TDM and their alternatives.
            • Role of Multiplexing in modern communication systems through data rate management

      Resources of Learning:

    • Week -9: Multiplexing

      week9

      Discussion Points: 

            • Review of Midterm Questions
            • Concept of Multiplexing
            • Demonstration of Frequency Division Multiplexing and its applications

      Expected Learning Outcomes:

            • Recognize the multiplexing technologies used for modern communication.
            • Identify and deployment of frequency division multiplexing techniques and alternatives.

      Resources of Learning:

      • Week - 10: Malware Detection and Analysis

        week10

        Discussion Points: 

              • Representation of CRC as Polynomials
              • Introduction of Checksum (Traditiona5l and Complementary)
              • Brief discussion about Error Corrections

        Expected Learning Outcomes:

              • Identify, deployment and differentiate between CRC (Polynomials) and Checksum and their real-time applications.
              • Appreciate the role of error correction in communication.

        Resources of Learning:

      • Quiz Week

        • Sec-55(B) Quiz-3
          Opened: Sunday, 28 May 2023, 8:30 AM
          Closed: Tuesday, 30 May 2023, 4:30 PM
          Restricted Not available unless: You belong to SEC-55B
      • Topic 13

      • Topic 14