Sunday, September 29, 2019
Information Security and Management Syllabus Essay
Confidentiality and Security, Security Policy and Operations Life Cycle, Security System Development and Operations Secure Networking Threats The Attack Process. Attacker Types. Vulnerability Types. Attack Results. Attack Taxonomy. Threats to Security: Physical security, Biometric systems, monitoring controls, and Data security and intrusion and detection systems. Encryption Techniques Conventional techniques, Modern techniques, DES, DES chaining, Triple DES, RSA algorithm, Key management. Message Authentication and Hash Algorithm, Authentication requirements and functions secure Hash Algorithm, Message digest algorithm, digital signatures. AES Algorithms. Designing Secure Networks Components of a Hardening Strategy. Network Devices. Host Operating Systems. Applications. Appliance-Based Network Services. Rogue Device Detection, Network Security Technologies The Difficulties of Secure Networking. Security Technologies. Emerging Security Technologies General Design Considerations, Layer 2 Security Considerations. IP Addressing Design Considerations. ICMP Design Considerations. Routing Considerations. Transport Protocol Design Considerations. Network Security Platform Options Network Security Platform Options. Network Security Device Best Practices, Common Application Design Considerations. E-Mail. DNS. HTTP/HTTPS. FTP. Instant Messaging. IPsec VPN Design Considerations VPN Basics. Types of IPsec VPNs. IPsec Modes of Operation and Security Options. Topology Considerations. Design Considerations. Site-to-Site Deployment Examples. Secure Network Management and Network Security Management Organizational Realities. Protocol Capabilities. Tool Capabilities. Secure Management Design Options. Network Security Management, Firewalls, Trusted systems, IT act and cyber laws. Text Books: 1. Sean Convery, ââ¬Å" Network Security Architectures, Published by Cisco Press, First Ed. 2004 2. William Stalling ââ¬Å"Cryptography and Network Securityâ⬠Fourth Ed. , Prentice Hall, 2006 Reference Books: 1. Charles P. Pfleeger, Shari Lawrence Pfleeger, ââ¬Å"Security in Computingâ⬠3rd Edition, Prentice Hall, 2003 2. Jeff Crume ââ¬Å"Inside Internet Securityâ⬠Addison Wesley, 2003 ISM 184 INFORMATION SECURITY POLICIES IN INDUSTRY L T/P C 3 1 4 Introduction to Information Security Policies About Policies ââ¬â why Policies are Important ââ¬â When policies should be developed ââ¬â How Policy should be developed ââ¬â Policy needs ââ¬â Identify what and from whom it is being protected ââ¬â Data security consideration ââ¬â Backups, Archival storage and disposal of data ââ¬â Intellectual Property rights and Policies ââ¬â Incident Response and Forensics ââ¬â Management Responsibilities ââ¬â Role of Information Security Department ââ¬â Security Management and Law Enforcement ââ¬â Security awareness training and support . The student will have to present the progress of the work through seminars and progress report. A report must be submitted to the University for evaluation purpose at the end of the semester in a specified format. ISM481 THESISL T/P C 0 0 16 The student will submit a synopsis at the beginning of the semester for the approval from the project committee in a specified format. Synopsis must be submitted within two weeks. The first defense, for the dissertation work, should be held with in two months time. Dissertation Report must be submitted in a specified format to the project committee for evaluation purpose at the end of semester.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.