National University of Sciences and Technology
Home | Back
IS-820 Computer Security
Campus MCS
Programs PG
Session Fall Semester 2016
Course Title Computer Security
Course Code IS-820
Credit Hours 3+0
Pre-Requisutes Nil
Course Objectives To introduce the traditional Computer Security, Operating Systems, Intrusion Detection and the Security Models.
Detail Content

1.

Introduction to secure computing Introduction to Computer Security , Basic Components , threat classes Policies and Mechanism, Trust assumptions  in modern computing systems, Types of mechanism, operational Issues , Human issues , Identification and AuthenticationWhy Computer systems are not secure , Internal and External Security , The System Boundary and the Security Perimeter, Automated tools for computer system related attacks, Pieces of security puzzle

2.

Security Policies and Models  Types of policies , Trust , Trust in formal verification methods , Types of Access control method(DAC,MAC,ORCON) , Example English Policy, Confidentiality Policies , Role of a Security Model , Characteristics of a Security Model , Types of Security Models , Bellapadula model , Integrity Policies : BIBA Model, Clark Wilson Model 

3.

Authentication Passwords and their management , Token devices , Synchronous and Asynchronous devices , Time based synchrono us devices ,  Cryptographic keys, Memory and Smart cards , pin protected cards, one time passwords, Biometrics etc., Windows Password Security, Unix Password Security, Types of Attacks on Passwords, Password hardening techniques

4.

Access Control Systems and Methodology Access control fundamentals , Biometrics , Discretionary access control, Access control lists (ACLs) and capabilities, implementation of access control, confinement and revocation, Mandatory access control, MAC models and their implementation, Role-based Access Control (RBAC), Multilevel Security, Access Criteria , Single Sign on Technologies , Kerberos , SESAME, Thin Clients , comments , Directory Services , Centralized Access Control Methodologies , RADIUS , TACASC, TACACS+ , Diameter , Technical Access Control Mechanisms , Unauthorized disclosure of information (Object reuse, TEMPEST etc)

5.

Computer Security Evaluation Standards Assurance Rating , TCSEC(Trusted Computer Security Evaluation Criteria) , Rainbow Series , ITSEC(Information Technology Security Evaluation Criteria), CC(Common Criteria), Certification and Accreditation

6.

Computer Security Attacks Understanding Covert Channel Attacks,Loki attack,  Trapdoors, Timing Attacks , Buffer Overflow attacks, Data Validation attacks, Trojan Horses , Viruses and Worms.  

7.

Kernal Security Computer Security Components, Storage types , Memory types ,Processes and Threads , Security in processes, Process isolation and controlled invocation, Operating System Security, Security kernel design and implementation,The Reference Monitor, Operating System Integrity, Protection on Motorola 6800, Protection on Intel 80386/486. Windows Security, Unix Security

8.

Database Security Sea View Model, Recovering from malicious transactions

Text/Ref Books

Text Book

and Reference

1. Computer Security by Dieter Gollman (latest edition available)

1. 2.

3.

4.

 

5.

Introduction to Computer Security by MATT Bishop

CISSP

Computer Security Basics by Rick Lehtinen and G.T. Gangemi Sr.

Security Strategies in Linux Platforms and Applications (Information Systems Security & Assurance)by Michael H. Jang

Guide to Operating Systems Securityby Michael J. Palmer

Time Schedule Fall Semester 2015
Faculty/Resource Person Lt Col Baber Aslam, PhD University of Central Florida, Orlando, USA
Discipline: Computer Science
Specialization: Information Security