National University of Sciences and Technology
Home | Back
IS-820 Computer Security
Campus MCS
Programs PG
Session Fall Semester 2016
Course Title Computer Security
Course Code IS-820
Credit Hours 3+0
Pre-Requisutes
Course Objectives To introduce the traditional Computer Security, Operating Systems, Intrusion Detection and the Security Models.
Detail Content
  1. Introduction to secure computing Introduction to Computer Security , Basic Components , threat classes Policies and Mechanism, Trust assumptions in modern computing systems, Types of mechanism, operational Issues , Human issues , Identification and AuthenticationWhy Computer systems are not secure , Internal and External Security , The System Boundary and the Security Perimeter, Automated tools for computer system related attacks, Pieces of security puzzle
  2. Security Policies and Models Types of policies , Trust , Trust in formal verification methods , Types of Access control method(DAC,MAC,ORCON) , Example English Policy, Confidentiality Policies , Role of a Security Model , Characteristics of a Security Model , Types of Security Models , Bellapadula model , Integrity Policies : BIBA Model, Clark Wilson Model
  3. Authentication Passwords and their management , Token devices , Synchronous and Asynchronous devices , Time based synchronous devices , Cryptographic keys, Memory and Smart cards , pin protected cards, one time passwords, Biometrics etc., Windows Password Security, Unix Password Security, Types of Attacks on Passwords, Password hardening techniques
  4. Access Control Systems and Methodology Access control fundamentals , Biometrics , Discretionary access control, Access control lists (ACLs) and capabilities, implementation of access control, confinement and revocation, Mandatory access control, MAC models and their implementation, Role-based Access Control (RBAC), Multilevel Security, Access Criteria , Single Sign on Technologies , Kerberos , SESAME, Thin Clients , comments , Directory Services , Centralized Access Control Methodologies , RADIUS , TACASC, TACACS+ , Diameter , Technical Access Control Mechanisms , Unauthorized disclosure of information (Object reuse, TEMPEST etc)
  5. Computer Security Evaluation Standards Assurance Rating , TCSEC(Trusted Computer Security Evaluation Criteria) , Rainbow Series , ITSEC(Information Technology Security Evaluation Criteria), CC(Common Criteria), Certification and Accreditation
  6. Computer Security Attacks Understanding Covert Channel Attacks, Loki attack, Trapdoors, Timing Attacks , Buffer Overflow attacks, Data Validation attacks, Trojan Horses , Viruses and Worms.
Text/Ref Books
  • 1. Computer Security by Dieter Gollman (latest edition available)
  • Introduction to Computer Security by MATT Bishop
  • CISSP
  • Computer Security Basics by Rick Lehtinen and G.T. Gangemi Sr.
  • Security Strategies in Linux Platforms and Applications (Information Systems Security & Assurance)by Michael H. Jang
  • Guide to Operating Systems Securityby Michael J. Palmer
Time Schedule Fall Semester 2015
Faculty/Resource Person Lec Mian Muhammad Waseem Iqbal, MS
National University of Science and Technology, Islamabad
Discipline: Information Security
Specialization: Information Security