Al al-Bayt University Information Technology Faculty Information Systems Department

smileybloatNetworking and Communications

Nov 20, 2013 (3 years and 11 months ago)

95 views


Al al
-
Bayt University

Information Technology
Faculty

Information Systems

Department

904480

Protecting MISs

First semester 2012


Course Catalog

As the disciplines of cryptography and network security have matured, more practical, re
adily available applications
to enforce network security have developed. This text provides a practical survey of both the principles and practice
of cryptography and network security. First, the basic issues to be addressed by a network security capabilit
y are
explored through a tutorial and survey of cryptography and network security technology. Then, the practice of
network security is explored via practical applications that have been implemented and are in use today.


Textbook(s)

Title

Cryptography a
nd Network Security
: Principles and Practice

Author(s)

William Stallings

Edition

5
th

edition

Publisher

Prentice
-
Hall

Year

20
10


Instructors

Coordinator

Dr.Wafa Slaibi Alsharafat

Office Location

IT building

Office Phone

02/
6297000 ext.
338
3

Email

wafa
@aabu.edu.jo


Class Schedule and Locations

Section 1
:

Time(s):
8:00
-

9:
3
0

Location:
Qurish

183


Office Hours

Dr.
Wafa AlSharafat
:

Sundays, Tuesdays : 9:00
-
10:00, Mondays 14:00


15:30


Course Objectives

Assessment Method

Objective 1
: Unde
rstanding the priciples of cryptography

Exams

Objective 2
:
encryption/decryption using different types of modern
ciphers

Term paper

Objective 3
understanding the most important security mechanisms
used to protect computer systems from threats




Topics

Covered

Topic

Chapter(s) in Text

Week(s)

Introduction

1

1

Classical Encryption Techniques

2

2
+
3

Block Ciphers and the Data Encryption Standard

3

4

More of Symmetric Ciphers

6

5+6

First exam



Public key cryptography and RSA

9

7+8

Digital Signatu
re

13

9

Intruders

18

10+11

Malicious Software

19

12

Second Exam



Firewalls

20


Web Security

17


Final exam





Course Outcomes:

1
-

I
t is expected from the students to
understand modern encryption techniques and cryptanalysis types

2
-

U
nderstand
ing different types of security mechanisms to save computer systems



Evaluation

Assessment Tool

Expected Due Date

Weight

Test 1

6
th

week

25
%

Test 2

12
th

week

25
%

Final Exam

TBA

50 %





Polic
ies

Attendance


It is strongly recommended that students
attend all data structure lectures. Also, university
regulations mandate that students may not miss more than 10% of classes without valid
excuses. In all cases, they may not miss more than 20% of classes.


Should they do, they
will be not be allowed to ta
ke course exams.


Homework/Lab

Students are expected to attend lab sessions and submit assignments on time.

Exams


Exams will be close
-
book. Exam dates will be announced later according to departmental
and university schedules.

Plagiarism

You should no
t copy other people's work and claim it is yours. Detected plagiarism will be
dealt with as per university regulations.