تدريسي جامعة بابل

جمهورية العراق
وزارة التعليم العالي والبحث العلمي
جهاز الاشراف والتقويم العلمي
جامعة بابل
تصميم شعبة تطوير المواقع
2015 | 2016

المعلومات الشخصية

اسم القسم علوم الحاسوب
لمرحلة الرابعة
اسم المحاظر محمد عبدالله ناصر
اللقب العلمي أستاذ مساعد
المؤهل العلمي دكتورا
مكان العمل جامعة بابل/كلية العلوم للبنات
البريد الالكتروني mohamed_1276@yahoo.com
اسم المادة Computer and Data Security
مقرر الفصل سنوي
أهداف المادة By the end of the course, students will be able to: 1. Identify the important principles and concepts that have been used to design a secure computer system form theoretical and practice side. 2. Aware of the growing need of using cipher methods to keep the data and information secure, this is happened through the studying and applying number of security methods in different applications. 3. State the basic background concepts, foundation, and insight into the many dimensions of information security, including computer security, information technology security, information assurance and others important security terminologies and concepts in this scope. 4. Explain concepts related to applied cryptology (cryptography & cryptanalysis) including plaintext, cipher text, encryption and decryption algorithms, key(s), key space, cryptographer, cryptanalyst and so on. 5. Explain the main cryptographic goals and state general types of key-based algorithms: symmetric and public-key with their properties. 6. Describe cryptographic system requirements, general types of cryptanalytic attacks and security algorithms criterion. 7. Study and discuss many cipher systems that divide into many groups according to different categories are classical systems (ceaser , decimation ,affine, vegenere, beufort ,and..etc.),stream system ,block cipher systems and public key systems (RSA ,knapsack ,..etc.). 8. Knowing the modern application in the field of computer, data and network security such as: steganography, watermarking, data base security, OS security, firewall, intrusion detection and others. 9. Enhance the student s ability to understand and develop new algorithms that is depending on the mathematical principles then programming and implementing number of ciphering algorithms using modern programming language. This depends on variant principles (not limits to the one concept or idea).
التفاصيل الاساسية لمادة This course gives a comprehensive introduction into the field of computer and data security. The course begins with an introductory overview of the concepts of information security, Important terminologies in computer and data security, cryptographic goals &requirements, classical cipher systems : (transposition cipher systems and substitution cipher systems which are included monoalphabtic , polyalphabetic, homophonic, and ploygram classical cipher systems) and classical systems cryptanalysis methods. Running key cipher , Vernam cipher , One time pad cipher ,Stream cipher systems (linear systems , nonlinear systems) , Stream encryption approaches , measure of randomness , and stream cipher cryptanalysis. Product cipher system, Fiestal cipher system, block cipher systems,Data Encryption Standard (DES( and its security , operation mode of DES. Block cipher cryptanalysis.Modular Arithmetics. One way hash function ,Public Key Cipher Systems Exponential cipher , Pohlig Hellman cipher , RSA cipher system, Knapsack cipher , and several public key digital signature algorithms.Authorization and Access Control Techniques . Advance Topics in computer security such as Steganography, Digital water mark , Fire wall system ,Intrusion detection technique, Network security system , Viruses and Antivirus software ,…etc.
الكتب المنهجية William Stallings," Cryptography and Network Security Principles and Practice ", Pearson Education, Inc., Sixth Edition 2014.
المصادر الخارجية 1. Alan. G.Kon HEIM, "Computer Security and Cryptography", John Wiley & Sons.Inc, 2007. 2. Bruce Shneier, "Applied Cryptography ,Protocols, Algorithms , and Source code ", John wiley and sons,Inc,1996. 3. Charles P. Pfleeger ," Security in Computing" , Fourth Edition, Prentice Hall ,2006. 4. Christof Paar • Jan Pelzl," Understanding Cryptography: A Textbook for Students and Practitioners", Springer-Verlag Berlin Heidelberg 2010. 5. JieWang," Computer Network Security Theory and Practice", Higher Education Press, Beijing, 2009. 6. Matt Bishop," Introduction to Computer Security", Pearson Education, Inc., 2005. 7. Stefan Katzenbien A. P. Petitcolas," Information Hiding Techniques for Steganography and Digital Watermarking", ARTECH HOUSE, INC. 2000. 8. William Stallings," Computer Security: Principles and Practice ", Pearson Education, Inc., Third Edition 2015.
معلومات الاضافية
تقريرات الفصل
الفصل الدراسي 35% لمختبر 15% الامتحانات اليومية 10 % لامتحان النهائي 40%
17 25 8 50