7
Ministry of Higher Education and Scientific research Directorate of Quality Assurance and Accreditation به ڕێوه به رایهتمانه جۆری و میای دڵنی تی به خشینKHABAT TECHNICAL INSTITUTE Department of Information technology Subject: information security Course Book – second year Lecturer's name MSc Younus Ameen Muhammed Academic Year: 2019/2020

KHABAT TECHNICAL INSTITUTE Department of Information ... information security.EN.pdfSeminar Homework, Reports Absence Posters 40% Theory Practical 10% 510% 5 35% 25% 100% 20% 20% 60%

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: KHABAT TECHNICAL INSTITUTE Department of Information ... information security.EN.pdfSeminar Homework, Reports Absence Posters 40% Theory Practical 10% 510% 5 35% 25% 100% 20% 20% 60%

Ministry of Higher Education and Scientific research

Directorate of Quality Assurance and Accreditation خشینبهتی دڵنیایی جۆری و متمانهرایهبهڕێوهبه

KHABAT TECHNICAL INSTITUTE

Department of Information technology

Subject: information security

Course Book – second year

Lecturer's name MSc Younus Ameen Muhammed

Academic Year: 2019/2020

Page 2: KHABAT TECHNICAL INSTITUTE Department of Information ... information security.EN.pdfSeminar Homework, Reports Absence Posters 40% Theory Practical 10% 510% 5 35% 25% 100% 20% 20% 60%

Ministry of Higher Education and Scientific research

Directorate of Quality Assurance and Accreditation خشینبهتی دڵنیایی جۆری و متمانهرایهبهڕێوهبه

Course Book

1. Course name Information security

2. Lecturer in charge Younus Ameen muhammed

3. Department/ College

4. Contact e-mail: [email protected] Tel: 7504724634

5. Time (in hours) per week Theory: 2 Practical: 2

6. Office hours

7. Course code

8. Teacher's academic profile Education: MSc, wireless system, University of kahramanmaras , turkey, 2014 BSc, physics, College of science education Salahaddin University, Kurdistan, Iraq, 2008. School history and details: My first degree is BSC in physics thus I was employed as an assistance physics at Soran University. After 2 years of working in presidency of soran university, IT department . I started my MSC from beginning of 2012 in kahramanmaras University in the turkey and graduated on January 2014. My background MSC is wireless systems. Then I started as assistants lecture in Faculty of Science / Computer Department on June 2014, manager of IT in soran university, Previous work 2009 until 2011, I was assistant physics, the same time I thought practical side of Teaching computer (Computer Sciences, Object Oriented Programming, Databases, Operating System and Internet Programming, Networking). SKILLS Technical: Computer Network, Network Security, basic of programming and web application Languages: mother tongue, English and Arabic

9. Keywords

10. Course overview: Information Security is a comprehensive study of the principles and practices of computer system security including operating system security, network security, software security and web security. Topics include common attacking techniques such as virus, trojan, worms and memory exploits; the formalisms of information security such as the access control and information flow

Page 3: KHABAT TECHNICAL INSTITUTE Department of Information ... information security.EN.pdfSeminar Homework, Reports Absence Posters 40% Theory Practical 10% 510% 5 35% 25% 100% 20% 20% 60%

Ministry of Higher Education and Scientific research

Directorate of Quality Assurance and Accreditation خشینبهتی دڵنیایی جۆری و متمانهرایهبهڕێوهبه

theory; the common security policies such as BLP and Biba model; the basic cryptography, RSA, cryptographic hash function, and password system; the real system implementations, with case study of SE-Linux, and Windows; network intrusion detection; software security theory; web security; legal and ethical issues in computer security. 11. Course objective:

Learning security fundamentals and some historic and modern encryption methods.

Knowing how to protect the computers against viruses via anti-virus programs.

Having good information about firewalls, internet security, viruses and anti-viruses

12. Student's obligation Every week there will be 2 hours theory. The first 10 minutes will be a review of last lectures by asking them some questions. To know how much the students understand the new topic there will be a discussion in terms of questions and answers in the last 10 minutes. Every week there will be 2 hours Practical. The lab will consist mainly of practical exercises. Each step of learning is followed by a practical session

13. Forms of teaching Using white board, Projector, PowerPoint Slides in theoretical lecture, and using computer lab and PCs in practical

14. Assessment scheme

Midterm Exam Activities Annual

Mark Final Exam

Total

Mark

Theory Practical Quizzes,

Seminar Homework,

Reports Absence Posters

40%

Theory Practical

100% 10% 10% 5 5 5 5 35% 25%

20% 20% 60%

15. Student learning outcome:

The student is capable of demonstrating advanced knowledge in the field of cyber and information

security in general and the following particular topics: computer and network security, security

management, incident response, computational and digital forensics, biometrics, privacy, and

security of critical infrastructure.

The students possesses special insight and can demonstrate expertise in information security

technology, digital forensics, or security management, depending on the chosen program track.

The student can demonstrate capabilities to apply knowledge in new areas within cyber and

information security, in particular cloud computer security, security on the Internet of Things (IoT),

and security of blockchain technology applications.

Page 4: KHABAT TECHNICAL INSTITUTE Department of Information ... information security.EN.pdfSeminar Homework, Reports Absence Posters 40% Theory Practical 10% 510% 5 35% 25% 100% 20% 20% 60%

Ministry of Higher Education and Scientific research

Directorate of Quality Assurance and Accreditation خشینبهتی دڵنیایی جۆری و متمانهرایهبهڕێوهبه

16. Course Reading List and References:

▪ Key references:

▪ Useful references

▪ Magazines and review (internet):

17. The Topics: Lecturer's name -An introduction to cryptography.

-Attacks on cryptography.

- what is computer security

- important terms in computer security

-Block cipher and stream cipher.

DES method.

AES method.

Random number generators and unbreakable stream cipher. -Substitution and transposition methods.

-Classical cryptographic methods:

Polybius method.

Monoalphabetic and polyalphabetic.

Caesar cipher

- breaking Polybius, Monoalphabetic and Caesar method. - Modern cryptographic methods:

Hill cipher.

German ADFGVX Cipher.

Affine cipher. -Introduction to public-key cryptography

RSA encryption method.

Elgamal method. -Introduction to Cryptanalysis.

-Steganography:

Introduction to Steganography.

History of Steganography.

Steganography types and methods. -Introduction to computer security :

Viruses

Worms

Lecturer's name ex: (2 hrs)

1

2

3-4

6

7

8-10

11

12

13

14-16

17-19

20-24

Page 5: KHABAT TECHNICAL INSTITUTE Department of Information ... information security.EN.pdfSeminar Homework, Reports Absence Posters 40% Theory Practical 10% 510% 5 35% 25% 100% 20% 20% 60%

Ministry of Higher Education and Scientific research

Directorate of Quality Assurance and Accreditation خشینبهتی دڵنیایی جۆری و متمانهرایهبهڕێوهبه

Trojan hours

Logic bomb

Anti-virus -Wireless Networks:

Wireless protocols.

Wi-Fi.

Intrusion detecting.

Internet security

IP security

Bluetooth security

Router security

-Network Security

Authentication

Confidentiality

Integrity

Non-reputation

Digital Signature

Firewall types and mechanisms.

VPN (Virtual Private Network)

-Project

25-28

29-30

18. Practical Topics (If there is any) Weeks Introduction to cryptography and C++.

Substitution method of cryptography program.

Transposition method of cryptography program. Polybius method of cryptography program.

Monoalphabetic method of cryptography program. Polyalphabetic method of cryptography program.

Caesar cypher method of cryptography program. Hill cypher method of cryptography program.

German ADFGVX Cypher method of cryptography program. Affine cypher method of cryptography program. Elgamal method of cryptography program. Project

1 2-3 4-6 7-9 10-12 13-15 16-17 18-20 21-23 24-25 25-27 28-29 30

19. Examinations: 1. choose the correct answer to complete each sentence:-

1. …………………………… Provide communication security between devices. a) Operating system security b) Security layers c) Software Security c) None of them

2. ……………………… The same key is used by both parties. a) Symmetric key b) Asymmetric key c) public key c) privet key

3. The Data Encryption Standard (DES) is a ……………….. block cipher.

Page 6: KHABAT TECHNICAL INSTITUTE Department of Information ... information security.EN.pdfSeminar Homework, Reports Absence Posters 40% Theory Practical 10% 510% 5 35% 25% 100% 20% 20% 60%

Ministry of Higher Education and Scientific research

Directorate of Quality Assurance and Accreditation خشینبهتی دڵنیایی جۆری و متمانهرایهبهڕێوهبه

a) Symmetric key b) Asymmetric key c) public key c) privet key 4. Is an attack model for cryptanalysis where the attacker has access to both the plaintext,

and its encrypted version? a) Known plain text b) Cipher text-only c) Chosen cipher text c) none of them

2. True or false type of exams:

a) Decryption is one of the most active ways to reach data security in cryptography process. b) Gateway security is critically important and very essay to use. c) Network access control products are similar to firewalls and IPS/IDS in that they allow or disallow

network access.

d) Authorization is the process through which the user asserts his or her identity and the server

validates that identity.

e) IPSec connection requires some communication between the two computers, but this is minimal.

20. Extra notes: Here the lecturer shall write any note or comment that is not covered in this template and he/she wishes to enrich the course book with his/her valuable remarks.

Page 7: KHABAT TECHNICAL INSTITUTE Department of Information ... information security.EN.pdfSeminar Homework, Reports Absence Posters 40% Theory Practical 10% 510% 5 35% 25% 100% 20% 20% 60%

21. Peer review 3la qeojrU3lql$

6*,{e< oe-sftry, . \uP

-/", ^urtt/i''"'/ ;( f-'* -O

n\)o'L1<A^\r

ol;Z"vo

Education and Scientific research

Directorate of Quality Assurance and Accreditation g*"i:al$& s cs -s-r.rr,r!fi .ja;l=9;ojr"4

///// r