Section outline
-
Course Instructor:
Professor Dr. Touhid Bhuiyan
Professor & Head
Department of Computer Science and Engineering
Faculty of Science and Information Technology
Daffodil International University
Contact Number: +880 1847140016
E-mail: headcse@daffodilvarsity.edu.bd,
t.bhuiyan@daffodilvarsity.edu.bd
Basic Information:
Course Code: CSE 423Course Title: Information SecurityProgram: B.Sc in Computer Science and EngineeringFaculty: Science and Information TechnologySemester: Fall; Year: 2022Credit: 3.0; Contact Hour: 3 Hours/ WeekCourse Category: Core EngineeringCourse Rationale:
Information security — or InfoSec — is the protection of information by people and organizations in order to keep information safe for themselves, their company, and their clients. Every organization needs protection against cyber attacks and security threats. Cybercrime and malware are constant threats to anyone with an Internet presence, and data breaches are time-consuming and expensive. The goal of IT security is to protect these assets, devices and services from being disrupted, stolen or exploited by unauthorized users, otherwise known as threat actors.Learning Objectives:
To provide a solid conceptual understanding of the fundamentals of Information Security. More specifically, In this course students will:
-Learn basics of information security, in both management aspect and technical aspect.
-Learn various types of security threats and attacks
-Learn basics of Security risks and Management process
-Learn ways to manage, detect and respond to incidents and attacks.
-Learn the benefits of AI and ML in the field of Information Security
-Learn basics of application of cryptography which are one of the key technologies to implement security functions.
-Learn the Legal and Ethical issues in information security
Course Learning Outcomes (CO's):
After successful completion of the course, students will be able to:
CO1: Interpret the components, tools and techniques of Information Security systems
CO2: Analyze various Information security threats, risks and propose controls for it.
CO3: Explain the Ethical issues and Laws in the field of Information Security
Assessment Strategies: