At the end of this course, the students; 1) Learn information security targets, principles, main measures. 2) Learn and apply basic concepts of cryptography and cryptosystems. 3) Know types of cryptanalysis. 4) Know symmetric and asymmetric ciphering systems, hash functions. 5) Informed of public key infrastructure, discrete logarithms, digital signatures. 6) Informed of access control systems, telecommunications, network and internet security. 7) Learn security management, application development security, business continuity planning.
MODE OF DELIVERY
Face to face
PRE-REQUISITES OF THE COURSE
No
RECOMMENDED OPTIONAL PROGRAMME COMPONENT
None
COURSE DEFINITION
Information security targets, principles, main measures. Basic concepts of cryptography and cryptosystems, types of cryptanalysis. Symmetric and asymmetric ciphering systems and examples. Hash functions and applications. Public key infrastructure. Discrete logarithms, digital signatures, secret sharing. Access control systems and methodology, Telecommunications, network and internet security. Security management, application development security, business continuity planning.
COURSE CONTENTS
WEEK
TOPICS
1st Week
Information security targets, principles, main measures.
2nd Week
Basic concepts of cryptography and cryptosystems, types of cryptanalysis.
3rd Week
Symmetric and asymmetric ciphering systems and examples.
4th Week
Hash functions and applications.
5th Week
Public key infrastructure.Discrete logarithms, digital signatures, secret sharing.
6th Week
Access control systems and methodology, Telecommunications, network and internet security.
7th Week
Security management, application development security, business continuity planning.
8th Week
Mid-term
9th Week
Security management, application development security, business continuity planning.
10th Week
Security management, application development security, business continuity planning.
11th Week
Security management, application development security, business continuity planning.
12th Week
Security management, application development security, business continuity planning.
13th Week
Security management, application development security, business continuity planning.
14th Week
Security management, application development security, business continuity planning.
RECOMENDED OR REQUIRED READING
1. Stallings, W., Cryptography and Network Security: Principles and Practice, 5/E, ISBN-10: 0136097049, Prentice Hall, 2011 2. Salomon, D., Data Privacy and Security: Encryption and Information Hiding, ISBN: 0387003118, Springer-Verlag New York, Inc., 2003 3. Whittaker, J., Thompson, H., How to Break Software Security, ISBN-10: 0321194330, Addison-Wesley, 2004