SlideShare a Scribd company logo
2
Most read
ANNA UNIVERSITY, CHENNAI
AFFILIATED INSTITUTIONS
B.TECH INFORMATION TECHNOLOGY REGULATIONS – 2017
SEMESTER-VIII
CHOICE BASED CREDIT SYSTEM
Syllabus
IT8073 INFORMATION SECURITY L T P C
3
0 0 3
OBJECTIVES:
To understand the basics of Information Security
 To know the legal, ethical and professional issues in Information Security
 To know the aspects of risk management
 To become aware of various standards in this area
 To know the technological aspects of Information Security
UNIT I INTRODUCTION 9
History, What is Information Security?, Critical Characteristics of Information, NSTISSC
Security Model, Components of an Information System, Securing the Components,
Balancing Security and Access, The SDLC, The Security SDLC .
UNIT II SECURITY INVESTIGATION 9
Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues -
An Overview of Computer Security - Access Control Matrix, Policy-Security policies,
Confidentiality policies, Integrity policies and Hybrid policies.
UNIT III SECURITY ANALYSIS 9
Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk -
Systems: Access Control Mechanisms, Information Flow and Confinement Problem.
UNIT IV LOGICAL DESIGN 9
Blueprint for Security, Information Security Policy, Standards and Practices, ISO 17799/BS
7799, NIST Models, VISA International Security Model, Design of Security Architecture,
Planning for Continuity
UNIT V PHYSICAL DESIGN 9
Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access Control
Devices, Physical Security, Security and Personnel .
OUTCOMES:
At the end of this course, the students should be able to:
 Discuss the basics of information security
 Illustrate the legal, ethical and professional issues in information security
 Demonstrate the aspects of risk management.
 Become aware of various standards in the Information Security System
 Design and implementation of Security Techniques.
TEXT BOOK:
1. Michael E Whitman and Herbert J Mattord, ―Principles of Information Security‖, Vikas
Publishing House, New Delhi, 2003
REFERENCES:
1. Micki Krause, Harold F. Tipton, ― Handbook of Information Security Management‖, Vol
1-3 CRCPress LLC, 2004.
2. Stuart McClure, Joel Scrambray, George Kurtz, ―Hacking Exposed‖, Tata McGrawHill,
2003
3. Matt Bishop, ―Computer Security Art and Science‖, Pearson/PHI, 2002.

More Related Content

PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PDF
RSA ALGORITHM
PPTX
Public Key Cryptosystem
PPTX
Cyber Threat Management
PDF
Electronic mail security
PPTX
Pgp pretty good privacy
PPTX
security and privacy-Internet of things
PPTX
Principles of public key cryptography and its Uses
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RSA ALGORITHM
Public Key Cryptosystem
Cyber Threat Management
Electronic mail security
Pgp pretty good privacy
security and privacy-Internet of things
Principles of public key cryptography and its Uses

What's hot (20)

PPT
Digital signature schemes
PPT
Natural language processing
PDF
Access Control Presentation
PDF
2. public key cryptography and RSA
PPTX
OSI Security Architecture
PDF
Top ten big data security and privacy challenges
PDF
Elliptic curve cryptography
PDF
Artificial Intelligence Notes Unit 1
PPTX
NIST CyberSecurity Framework: An Overview
PPTX
CS8792 - Cryptography and Network Security
PPTX
Authentication service security
PDF
Navigating Zero Trust Presentation Slides
PDF
Network security - OSI Security Architecture
PPTX
Knowledge representation in AI
PPT
Email security
PPTX
Cryptography and network security
PPTX
Law and Ethics in Information Security.pptx
PPT
Network security cryptography ppt
PPSX
Security policies
PPTX
Machine learning ppt.
Digital signature schemes
Natural language processing
Access Control Presentation
2. public key cryptography and RSA
OSI Security Architecture
Top ten big data security and privacy challenges
Elliptic curve cryptography
Artificial Intelligence Notes Unit 1
NIST CyberSecurity Framework: An Overview
CS8792 - Cryptography and Network Security
Authentication service security
Navigating Zero Trust Presentation Slides
Network security - OSI Security Architecture
Knowledge representation in AI
Email security
Cryptography and network security
Law and Ethics in Information Security.pptx
Network security cryptography ppt
Security policies
Machine learning ppt.
Ad

Similar to It8073 information security syllabus (20)

PPT
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
PDF
INT407 INFORMATION SECURITY AND PRIVACY.pdf
PDF
IS-Intro.pdf
PPTX
Introduction to Information Systems Security
PDF
it2042-unit1.pd AIM To study the critical need for ensuring Information Secu...
PPTX
Information security principles
PPT
Introduction to information security
DOC
Information security management.doc
PPTX
Unit1 Cyber NIET Greater Noida Uttar Pradesh
PPTX
ICS_Unit-I_Foundations of Information Security
PPT
ch0001 computer systems security and principles and practices
PDF
ISS-Unit-1.pdf
PPTX
CYBER LAW & ETHICS (PART OF THE JNTUH SYLLABUS
DOCX
IT 411-Syllabus in Information Technology
PPTX
security of information systems
PDF
cryptograph and computer security lecture 1.pdf
PPTX
Cyber security
PDF
Lecture 1-2.pdf
PPT
information security management
PPTX
Provide Network System Administrationa.pptx
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
INT407 INFORMATION SECURITY AND PRIVACY.pdf
IS-Intro.pdf
Introduction to Information Systems Security
it2042-unit1.pd AIM To study the critical need for ensuring Information Secu...
Information security principles
Introduction to information security
Information security management.doc
Unit1 Cyber NIET Greater Noida Uttar Pradesh
ICS_Unit-I_Foundations of Information Security
ch0001 computer systems security and principles and practices
ISS-Unit-1.pdf
CYBER LAW & ETHICS (PART OF THE JNTUH SYLLABUS
IT 411-Syllabus in Information Technology
security of information systems
cryptograph and computer security lecture 1.pdf
Cyber security
Lecture 1-2.pdf
information security management
Provide Network System Administrationa.pptx
Ad

Recently uploaded (20)

PDF
Categorization of Factors Affecting Classification Algorithms Selection
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPT
Project quality management in manufacturing
PPTX
additive manufacturing of ss316l using mig welding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
DOCX
573137875-Attendance-Management-System-original
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
PPT on Performance Review to get promotions
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Categorization of Factors Affecting Classification Algorithms Selection
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
CYBER-CRIMES AND SECURITY A guide to understanding
Mechanical Engineering MATERIALS Selection
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
UNIT 4 Total Quality Management .pptx
Project quality management in manufacturing
additive manufacturing of ss316l using mig welding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
573137875-Attendance-Management-System-original
Safety Seminar civil to be ensured for safe working.
PPT on Performance Review to get promotions
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx

It8073 information security syllabus

  • 1. ANNA UNIVERSITY, CHENNAI AFFILIATED INSTITUTIONS B.TECH INFORMATION TECHNOLOGY REGULATIONS – 2017 SEMESTER-VIII CHOICE BASED CREDIT SYSTEM Syllabus IT8073 INFORMATION SECURITY L T P C 3 0 0 3 OBJECTIVES: To understand the basics of Information Security  To know the legal, ethical and professional issues in Information Security  To know the aspects of risk management  To become aware of various standards in this area  To know the technological aspects of Information Security UNIT I INTRODUCTION 9 History, What is Information Security?, Critical Characteristics of Information, NSTISSC Security Model, Components of an Information System, Securing the Components, Balancing Security and Access, The SDLC, The Security SDLC . UNIT II SECURITY INVESTIGATION 9 Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues - An Overview of Computer Security - Access Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid policies. UNIT III SECURITY ANALYSIS 9 Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk - Systems: Access Control Mechanisms, Information Flow and Confinement Problem. UNIT IV LOGICAL DESIGN 9 Blueprint for Security, Information Security Policy, Standards and Practices, ISO 17799/BS 7799, NIST Models, VISA International Security Model, Design of Security Architecture, Planning for Continuity UNIT V PHYSICAL DESIGN 9 Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access Control Devices, Physical Security, Security and Personnel . OUTCOMES: At the end of this course, the students should be able to:
  • 2.  Discuss the basics of information security  Illustrate the legal, ethical and professional issues in information security  Demonstrate the aspects of risk management.  Become aware of various standards in the Information Security System  Design and implementation of Security Techniques. TEXT BOOK: 1. Michael E Whitman and Herbert J Mattord, ―Principles of Information Security‖, Vikas Publishing House, New Delhi, 2003 REFERENCES: 1. Micki Krause, Harold F. Tipton, ― Handbook of Information Security Management‖, Vol 1-3 CRCPress LLC, 2004. 2. Stuart McClure, Joel Scrambray, George Kurtz, ―Hacking Exposed‖, Tata McGrawHill, 2003 3. Matt Bishop, ―Computer Security Art and Science‖, Pearson/PHI, 2002.