Information Security

CS-3610-1, Monsoon 2025

Course being taught by Subhashis Banerjee at Ashoka University

Learning outcome

This course will help students understand and model information security in the modern world. It will help students reason concretely about real-world problems through case studies. This course will not cover design of security systems, but will cover requirement analysis methods and threat modelling. It will also familiarise students with commonly used security tools and measures in everyday life.

Pre‑requisites

Data Structures and Algorithms, Probability and Statistics

Coverage

Reading list

  1. Matthew A. Bishop, Computer Security: Art and Science, 2nd Edition, Pearson, 2018
  2. Bruce Schneier, Applied Cryptography, John Wiley & Sons, 1996
  3. William Stallings, Cryptography and Network Security: Principles and Practice, 8th Edition, Pearson, 2022
  4. Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition, Wiley, 2020
  5. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, 3rd Edition, Pearson

Honour code

Attendance requirement

The course will require 100% attendance. It will be hard to catch up if there are too many missed classes. Class participation will count towards grading. There will be no make-up provisions for missed quizzes and class participation, for whatever reason. Best of n-1 quizzes out of n will count toward the final grade. Make-up tests may be allowed for the midterm and final exams (only due to illness) on production of a medical certificate clearly stating that the student was not in a position to take the test. A medical prescription will not be sufficient.

Evaluations