Master of Information Security (MS IS) program at PAF-IAST aims to provide solid knowledge and practical skills of security in information and network systems. Main focus of MS IS program is on systems and networks security, risk and data management, preventative measures, computer ethics, digital signatures, and cryptography. Students of this specialized program will learn how to identify threats, vulnerabilities and privacy issues pertaining to cyberspace. Likewise they will obtain exposure to integrate security into mobile computing platform and explore methods for holding cloud stakeholders accountable for the privacy and confidentiality of data in mobile systems. Students will also develop understanding of structured risk management process that involves identifying information and related assets, plus potential threats, vulnerabilities and impacts, evaluating the risks, and risks mitigations.
With 6 billion active mobile subscriptions, and around 50% increase per year of tablet adoption, smart phones, handheld devices, and tablets are now an integral part of the mobile office. Business owners are always on the go overseeing multiple locations, servicing customers, and managing suppliers. With security management apps, we can have the ability to interact with systems from a mobile device and have the freedom to manage virtually all security controls as if we were on premises. In this Context, there is high demand of workforce who can efficiently implement the security mechanism on the advanced systems and communication technologies. The main aim of this program is to fulfill the growing national need of well-trained professionals to work in a wide range of roles to protect Information Systems in all types of organizations, including research and academia. Graduates of MS IS program are envisioned to play key role in success of organizations especially tech-companies and financial-institutions while managing access to corporate resources according to approved practices and policies and protecting the IT infrastructure against internal and external attack.
Code | Course Title | Credit Hours | Labs | Total |
COMP-### | Advanced Analysis of Algorithms (Core Course) | 3 |
| 3 |
COMP-### | Information Privacy and Security (Core Course) | 3 |
| 3 |
COMP-### | Elective-I | 3 |
| 3 |
SS-### | Research Methodology | 2 |
|
|
| Total Credit Hours |
|
| 9 |
Code | Course Title | Credit Hours | Labs | Total |
COMP-### | Cryptography (Core Course) | 3 |
| 3 |
COMP-### | Elective-II | 3 |
| 3 |
COMP-### | Elective-III | 3 |
| 3 |
| Total Credit Hours | 10 |
| 9 |
Code | Course Title | Credit Hours | Labs | Total |
COMP-821 | Research Work | 3 |
| 3 |
COMP-### | Elective-IV | 3 |
| 3 |
| Total Credit Hours | 6 |
| 6 |
Code | Course Title | Credit Hours | Labs |
|
COMP-892 | Thesis | 3 |
| 3 |
COMP-### | Elective-V | 3 |
| 3 |
| Total Credit Hours | 6 |
| 6 |