422
Page views
4
Files
4
Videos
2
R.Links

Icon
Syllabus

UNIT
1
Information security

Introduction – Growing IT Security – Importance and New Career Opportunities – Becoming and Information Security Specialist – Conceptualizing Information Security – Information Security Principles of Success : Introduction –Twelve Principles

UNIT
2
Security Management

Introduction – Security Policies set the stage for Success – Four Types of Policies – Development Management of Security policies – Policy support Documents – Suggested standards Taxonomy – Security Architecture and Models: Introduction – Defining the Trust Computing Base – Protection Mechanism in a Trusted Computing Base – System Security Assurance Concepts – Trusted Computer Security Evaluation Criteria

UNIT
3
Information Technology Security Evaluation Criteria

Federal Criteria for Information Technology Security – The Common Criteria – Confidentiality and Integrity Models – Law, Investigation and Ethics: Introduction – Types of Computer Crimes – How Computer Criminals commit Crimes – The Computer and the Law – Intellectual property law – Privacy and the Law – Computer Forensics – The Information Security Professionals Code of Ethics – Other Ethics Standards.

UNIT
4
Physical Security Control

Introduction – Understanding the Physical Security Domain – Physical Security Threats – Providing Physical Security – Operations Security : Introduction – Operations Security Principles – Operations Security Process Controls – Operations Security Controls in Action

UNIT
5
Access control systems and Methodology

Introduction – Terms and Concepts –Principles of Authentication – Biometrics – Single sign-on-Remote User Access and Authentication – Cryptography: Introduction – Applying Cryptography to Information systems – Basic Terms and Concepts – Strength of Cryptosystems – Putting the pieces to work – Examining Digital Cryptography

Reference Book:

1. Matt Bishop, “Computer Security: Art and Science”, Pearson Education New Delhi, 2006 2. Whitman, “Principles of Information Security”, Second Edition, Pearson Education NeDelhi, 2004.

Text Book:

1. Mark Merkow and Jim Breithaupt, ”Information Security: Principles and Practices” , Pearson Education New Delhi, 2007. Unit I: Chapter 1, 2 - Unit II: Chapter 4,5 - Unit III: Chapter 7. Unit IV: Chapter 8,9. - Unit V: Chapter 10, 11.

 

Print    Download