Presented by : Dr. Sarah Mustafa Eljack Babiker

Slides:



Advertisements
Similar presentations
Computer Science Department
Advertisements

1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall Prof. Mohammad A. Mikki Room.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010.
FIT3105 Security and Identity Management Lecture 1.
1 1DT066 Distributed Information Systems Dr. Edith C.-H. Ngai Department of Information Technology Uppsala University.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
INTRODUCTION TO NETWORK SECURITY l.Tahani Aljehani.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
BUSINESS B1 Information Security.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Data Structures Lecture 1 : Model Course Syllabi 0 Dr. Essam Halim Houssein Lecturer, Faculty of Computers and Informatics, Benha University.
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
@Yuan Xue CS 285 Network Security Fall 2008.
Syllabus Faculty of Applied Engineering and Urban Planning Civil Engineering Department Lecture - Week 1 2 nd Semester 2008/2009 UP Copyrights 2008 Introduction.
TMK 264: COMPUTER SECURITY OVERVIEW. No SUBJECT DETAIL 1.Subject NameComputer Security 2.CodeTMK StatusCore 4.Credit Hour3 5.SemesterSemester 4,
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
© Uppsala University, IT Dept. Computer Networks I / DT052 Computer Networks I Dr. Edith C.-H. Ngai Department of Information Technology Uppsala.
Operating system Security By Murtaza K. Madraswala.
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
(EE429) First day Course Materials Assistant Prof. Dr. Anwar Hassan Selected Topics Communications.
1DT057 Distributed Information Systems Dr. Edith C.-H. Ngai Department of Information Technology Uppsala University.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
CIS 3360: Security in Computing Cliff Zou Spring 2012.
1 AP/ITEC “Systems Analysis and Design, I” Course Introduction Course Introduction [Prof. Peter Khaiter]
© Uppsala University, IT Dept. Computer Networks I / DT014/1TT821 Computer Networks I Dr. Edith C.-H. Ngai Department of Information Technology.
1DT057 Distributed Information System Dr. Edith C.-H. Ngai Department of Information Technology Uppsala University.
Introduction & Overview Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
 Course Overview Distributed Systems IT332. Course Description  The course introduces the main principles underlying distributed systems: processes,
Introduction to Information Security J. H. Wang Sep. 18, 2012.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
1 1DT066 Distributed Information Systems Dr. Edith C.-H. Ngai Department of Information Technology Uppsala University.
1 NES554: Computer Networks Defense Course Overview.
PRESENTED BY : Dr. Sarah M.Eljack 8/31/ The course codeThe course nameCredit hours COMP413Computer graphics3 The course contents (lectures + exercises)
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
© Uppsala University, IT Dept. Computer Networks I / DT052 Computer Networks I Dr. Edith C.-H. Ngai Department of Information Technology Uppsala.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Operating Systems (CS 340 D) Dr. Abeer Mahmoud Princess Nora University Faculty of Computer & Information Systems Computer science Department.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
COMP9024: Data Structures and Algorithms Course Outline Hui Wu Session 1, 2016
CS431 Distributed Systems
Software Engineering (1)
COMP9024: Data Structures and Algorithms
Introduction Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe.
Administrative Details
Introduction to Information Security
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Introduction to the course
EEC 688/788 Secure and Dependable Computing
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Introduction to Course
Presentation transcript:

Presented by : Dr. Sarah Mustafa Eljack Babiker

About the course The name of the course is computer security Its pure theoretical topic no lab work. It has three credit hours Its an important topic especially nowadays

The course objectives Understand the basic concepts in computer security Explain main concepts related to applied cryptography Explain the concepts of malicious code, including virus, Trojan horse, and worms. Outline the requirements and mechanisms for identification and authentication.

The course objectives Explain and compare security mechanisms for conventional operating systems Describe threats to networks, and explain techniques for ensuring network security Explain the requirements and techniques for security management, including security policies, risk analysis, and physical threats and controls. Understand the concepts of web security

The course outlines مبادئ الأمن، النماذج، والهجمات. Principles of Security, attacks علم التشفير ( الترميز السري ). التعمية بمفتاح وبمفتاح سري. Cryptography, public and private key encryption, التحقق ( التثبت ) والتوقيعات الرقمية.verification and digital signature برتوكولات التشفير وإدارة المفاتيح.encryption protocols and key managements التحكم في الوصول. بناء نظم حاسوبية آمنة.access control and الامن في نظم التشغيل. Operating system security الامن في شبكات الحاسوبية. Computer network security إدارة وتحليل الامن الحاسوبي، تحليل المخاطر، سياسات الامن الحاسوبي.computer security analysis and management, risk analysis, computer security policies المواصفات والمقاييس العالمية لامن المعلومات.international specification and standardization of information security اكتشاف الاقتحام والاستجابة للواقعة. Detect intrusions and responding to the incident

The main Reference William Stallings, Lawrie Brown, “Computer Security: Principles and Practice”, Prentice Hall 2008, ISBN 13:

Other References Mark Stamp, "Information Security : Principles and Practice",2006 Jon Wiley & Sons Inc., ISBN Charles P. Pfleeger, Shari Lawrence Pfleeger, “Security in Compung” 4/E, PrenTce Hall 2007, ISBN-13: Michael Goodrich, Roberto Tamassia, Introduction to Computer Security, Addison-Wesley 2011, ISBN-13:

The course outcomes After finishing this course the student must be able to Introduce the principles of security Define the cryptography Differentiates between public and private key encryption Implement the appropriate security method Perform the network security methods

Assessment The course assessment consist of 1 st test week six 15% 2 nd test week twelve 15% Seminar and presentation 10% Final exam week fifteen 60%

Question bank Questions will be made each week in the training hour. Each student should try to answer the questions individually. Collecting these questions to be a question bank covering all the subject.

Contacting the course instructor The lecture time is the specific time to discuss any issues related to subject The class room is the place where the students can ask and discuss any related topics. The office hours are for academic questions,

. Thanks for listening