Campus
|
MCS
|
Programs
|
PG
|
Session
|
Fall Semester 2016
|
Course Title
|
Computer Security
|
Course Code
|
IS-820
|
Credit Hours
|
3+0
|
Pre-Requisutes
|
Nil
|
Course Objectives
|
To introduce the traditional Computer Security, Operating Systems, Intrusion Detection and the Security Models.
|
Detail Content
|
1.
|
Introduction to secure computing Introduction to Computer Security , Basic Components , threat classes Policies and Mechanism, Trust assumptions in modern computing systems, Types of mechanism, operational Issues , Human issues , Identification and AuthenticationWhy Computer systems are not secure , Internal and External Security , The System Boundary and the Security Perimeter, Automated tools for computer system related attacks, Pieces of security puzzle
|
2.
|
Security Policies and Models Types of policies , Trust , Trust in formal verification methods , Types of Access control method(DAC,MAC,ORCON) , Example English Policy, Confidentiality Policies , Role of a Security Model , Characteristics of a Security Model , Types of Security Models , Bellapadula model , Integrity Policies : BIBA Model, Clark Wilson Model
|
3.
|
Authentication Passwords and their management , Token devices , Synchronous and Asynchronous devices , Time based synchrono us devices , Cryptographic keys, Memory and Smart cards , pin protected cards, one time passwords, Biometrics etc., Windows Password Security, Unix Password Security, Types of Attacks on Passwords, Password hardening techniques
|
4.
|
Access Control Systems and Methodology Access control fundamentals , Biometrics , Discretionary access control, Access control lists (ACLs) and capabilities, implementation of access control, confinement and revocation, Mandatory access control, MAC models and their implementation, Role-based Access Control (RBAC), Multilevel Security, Access Criteria , Single Sign on Technologies , Kerberos , SESAME, Thin Clients , comments , Directory Services , Centralized Access Control Methodologies , RADIUS , TACASC, TACACS+ , Diameter , Technical Access Control Mechanisms , Unauthorized disclosure of information (Object reuse, TEMPEST etc)
|
5.
|
Computer Security Evaluation Standards Assurance Rating , TCSEC(Trusted Computer Security Evaluation Criteria) , Rainbow Series , ITSEC(Information Technology Security Evaluation Criteria), CC(Common Criteria), Certification and Accreditation
|
6.
|
Computer Security Attacks Understanding Covert Channel Attacks,Loki attack, Trapdoors, Timing Attacks , Buffer Overflow attacks, Data Validation attacks, Trojan Horses , Viruses and Worms.
|
7.
|
Kernal Security Computer Security Components, Storage types , Memory types ,Processes and Threads , Security in processes, Process isolation and controlled invocation, Operating System Security, Security kernel design and implementation,The Reference Monitor, Operating System Integrity, Protection on Motorola 6800, Protection on Intel 80386/486. Windows Security, Unix Security
|
8.
|
Database Security Sea View Model, Recovering from malicious transactions
|
|
Text/Ref Books
|
Text Book
and Reference
|
1. Computer Security by Dieter Gollman (latest edition available)
|
1. 2.
3.
4.
5.
|
Introduction to Computer Security by MATT Bishop
CISSP
Computer Security Basics by Rick Lehtinen and G.T. Gangemi Sr.
Security Strategies in Linux Platforms and Applications (Information Systems Security & Assurance)by Michael H. Jang
Guide to Operating Systems Securityby Michael J. Palmer
|
|
Time Schedule
|
Fall Semester 2015
|
Faculty/Resource Person
|
Lt Col Baber Aslam, PhD University of Central Florida, Orlando, USA
Discipline: Computer Science
Specialization: Information Security
|
|