Professional Documents
Culture Documents
Course Aim/s. Enhance basic understanding of computer security and encourage application security to every aspect in
computing.
Programme • PLO1: Subject and Theoretical Knowledge: Establish the fundamental and specialized knowledge
Learning and understanding in the area of Computer Science, and critically analyze data to make judgments
Outcomes and propose solutions to problems.
(PLO)
addressed by • PLO2: Practical Knowledge and Application: Practical skill development and application to
course construct arguments, ideas, and solve problems effectively and efficiently in the field of computer
science.
• PLO3: Communication: Communicate or present ideas, issues and solutions effectively and
efficiently accompanied by awareness of current trends and developments in the field of computer
science.
• PLO5: Creativity and Problem Solving: Construct sustained arguments and use these arguments
and ideas with techniques to find solutions for a given situations.
• PLO8: Attitudes, Values and Professionalism: Demonstrate positive attitudes, personal
responsibility, accountability, value professionalism and act on the ethics established in the workplace,
and tasks performed.
• PLO9: Vision for Life: Develop the capability to identify self-capacity and visualize the future goals,
and plan accordingly to improve competencies to assume major responsibilities with confidence.
• PLO10: Updating Self: Improve competencies via training and higher studies to develop additional
skills that will enable them in making sound decisions. Engage in independent learning using scholarly
reviews and secondary sources of information.
Course At the completion of this course student will be able to:
Learning
Outcomes • CLO1: Analyze the tradeoffs of balancing key security properties (Confidentiality, Integrity, and
(CLO) Availability). (PLO1, PLO2)
• CLO2: Describe the concepts of risk, threats, vulnerabilities and attack vectors (including the fact that
there is no such thing as perfect security). (PLO1, PLO2, PLO5)
• CLO3: Explain the concepts of authentication, authorization, access control. (PLO 2, PLO 10)
• CLO4: Explain the concept of trust and trustworthiness. (PLO10, PLO3)
• CLO5: Familiarize ethical behavioral patterns as a security specialist (PLO11, PLO2)
• CLO6: Identify operation of secure organization and application of knowledge to achieve one.
• CLO7: Application of knowledge in analyzing situations and proposing security solutions (PLO1,
PLO2, PLO3, PLO4)
• CLO8: Identify personal responsibility in secure computing (PLO12)
Content 1. Introduction to the course
(Main topics,
subtopics) 2. Security and Awareness
3. Information Security Concepts
4. Security terminology
5. CIA (Confidentiality, Integrity, Availability)
6. Concepts of risk, threats, vulnerabilities, and attack vectors
7. Authentication and authorization, access control (mandatory vs. discretionary)
8. Security system design
9. Security Models
10. Concept of trust and trustworthiness
11. Attacks, threats, and attackers
12. Attacker goals, capabilities, and motivations (such as underground economy, digital espionage
13. Examples of malware (e.g., viruses, worms, spyware, botnets, Trojan horses or rootkits)
14. Denial of Service (DoS) and Distributed Denial of Service (DDoS)
15. Social engineering
16. cyberwarfare, insider threats, hacktivism, advanced persistent threats)
17. Privacy, Attacks on privacy and anonymity –
Social models that inform interaction design: culture, communication, networks and organizations
Contact sessions
• Day schools, online classes Non- compulsory
• Laboratory practical exercises (compulsory)