Sunday, November 10, 2019

Information Security and Management Syllabus Essay

Confidentiality and Security, Security Policy and Operations Life Cycle, Security System Development and Operations Secure Networking Threats The Attack Process. Attacker Types. Vulnerability Types. Attack Results. Attack Taxonomy. Threats to Security: Physical security, Biometric systems, monitoring controls, and Data security and intrusion and detection systems. Encryption Techniques Conventional techniques, Modern techniques, DES, DES chaining, Triple DES, RSA algorithm, Key management. Message Authentication and Hash Algorithm, Authentication requirements and functions secure Hash Algorithm, Message digest algorithm, digital signatures. AES Algorithms. Designing Secure Networks Components of a Hardening Strategy. Network Devices. Host Operating Systems. Applications. Appliance-Based Network Services. Rogue Device Detection, Network Security Technologies The Difficulties of Secure Networking. Security Technologies. Emerging Security Technologies General Design Considerations, Layer 2 Security Considerations. IP Addressing Design Considerations. ICMP Design Considerations. Routing Considerations. Transport Protocol Design Considerations. Network Security Platform Options Network Security Platform Options. Network Security Device Best Practices, Common Application Design Considerations. E-Mail. DNS. HTTP/HTTPS. FTP. Instant Messaging. IPsec VPN Design Considerations VPN Basics. Types of IPsec VPNs. IPsec Modes of Operation and Security Options. Topology Considerations. Design Considerations. Site-to-Site Deployment Examples. Secure Network Management and Network Security Management Organizational Realities. Protocol Capabilities. Tool Capabilities. Secure Management Design Options. Network Security Management, Firewalls, Trusted systems, IT act and cyber laws. Text Books: 1. Sean Convery, â€Å" Network Security Architectures, Published by Cisco Press, First Ed. 2004 2. William Stalling â€Å"Cryptography and Network Security† Fourth Ed. , Prentice Hall, 2006 Reference Books: 1. Charles P. Pfleeger, Shari Lawrence Pfleeger, â€Å"Security in Computing† 3rd Edition, Prentice Hall, 2003 2. Jeff Crume â€Å"Inside Internet Security† Addison Wesley, 2003 ISM 184 INFORMATION SECURITY POLICIES IN INDUSTRY L T/P C 3 1 4 Introduction to Information Security Policies About Policies – why Policies are Important – When policies should be developed – How Policy should be developed – Policy needs – Identify what and from whom it is being protected – Data security consideration – Backups, Archival storage and disposal of data – Intellectual Property rights and Policies – Incident Response and Forensics – Management Responsibilities – Role of Information Security Department – Security Management and Law Enforcement – Security awareness training and support . The student will have to present the progress of the work through seminars and progress report. A report must be submitted to the University for evaluation purpose at the end of the semester in a specified format. ISM481 THESISL T/P C 0 0 16 The student will submit a synopsis at the beginning of the semester for the approval from the project committee in a specified format. Synopsis must be submitted within two weeks. The first defense, for the dissertation work, should be held with in two months time. Dissertation Report must be submitted in a specified format to the project committee for evaluation purpose at the end of semester.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.