Topic outline

  • Welcome to Information Security


      

    Course Instructor:


    Professor Dr. Touhid Bhuiyan
    Professor & Head
    Department of Computer Science and Engineering
    Faculty of Science and Information Technology
    Daffodil International University
    Contact Number: +880 1847140016
    E-mail:  headcse@daffodilvarsity.edu.bd,
                t.bhuiyan@daffodilvarsity.edu.bd

           

    Basic Information:

    Course Code: CSE 423
    Course Title: Information Security
    Program: B.Sc in Computer Science and Engineering
    Faculty: Science and Information Technology
    Semester: Fall; Year: 2022
    Credit: 3.0; Contact Hour: 3 Hours/ Week
    Course Category: Core Engineering


    Course Rationale:

    Information security — or InfoSec —  is the protection of information by people and organizations in order to keep information safe for themselves, their company, and their clients. Every organization needs protection against cyber attacks and security threats. Cybercrime and malware are constant threats to anyone with an Internet presence, and data breaches are time-consuming and expensive. The goal of IT security is to protect these assets, devices and services from being disrupted, stolen or exploited by unauthorized users, otherwise known as threat actors.

    Learning Objectives:

    To provide a solid conceptual understanding of the fundamentals of Information Security. More specifically, In this course students will:

      -Learn basics of information security, in both management aspect and technical aspect. 

      -Learn various types of security threats and attacks

      -Learn basics of Security risks and Management process

      -Learn ways to manage, detect and respond to incidents and attacks. 

      -Learn the benefits of AI and ML in the field of Information Security

      -Learn basics of application of cryptography which are one of the key technologies to implement security functions.                                         

      -Learn the Legal and Ethical issues in information security


    Course Learning Outcomes (CO's):

    After successful completion of the course, students will be able to:

    CO1: Interpret the components, tools and techniques of Information Security systems     

    CO2: Analyze various Information security threats, risks and propose controls for it.

    CO3: Explain the Ethical issues and Laws in the field of Information Security


    Assessment Strategies: