Wednesday, February 27, 2019

Information Security and Management Syllabus Essay

Confidentiality and trade protection, tribute Policy and trading operations Life Cycle, hostage System Development and Operations batten down mesh topologying Threats The ardour Process. Attacker Types. Vulnerability Types. Attack Results. Attack Taxonomy. Threats to security measures Physical security, Biometric systems, observe controls, and entropy security and intrusion and detection systems. Encryption Techniques Conventional techniques, moderne techniques, DES, DES chaining, Triple DES, RSA algorithm, Key management. Message trademark and Hash Algorithm, Authentication requirements and functions secure Hash Algorithm, Message digest algorithm, digital signatures.AES Algorithms. pictureing Secure Net naturalises Components of a Hardening Strategy. Ne twainrk Devices. Host Operating Systems. Applications. Appliance-Based Network Services. scalawag Device Detection, Network warranter Technologies The Difficulties of Secure Networking. Security Technologies. Emerging Security Technologies General public figure Considerations, Layer 2 Security Considerations. IP Addressing Design Considerations. ICMP Design Considerations. Routing Considerations. Transport Protocol Design Considerations. Network Security curriculum Options Network Security Platform Options.Network Security Device scoop out Practices, Common Application Design Considerations. E-Mail. DNS. HTTP/HTTPS. FTP. Instant Messaging. IPsec VPN Design Considerations VPN Basics. Types of IPsec VPNs. IPsec Modes of Operation and Security Options. Topology Considerations. Design Considerations. Site-to-Site Deployment Examples. Secure Network Management and Network Security Management Organizational Realities. Protocol Capabilities. Tool Capabilities. Secure Management Design Options. Network Security Management, Firewalls, Trusted systems, IT act and cyber laws. Text Books 1.Sean Convery, Network Security Architectures, Published by Cisco Press, First Ed. 2004 2. William Stalling Cryptogr aphy and Network Security Fourth Ed. , Prentice Hall, 2006 Reference Books 1. Charles P. Pfleeger, Shari Lawrence Pfleeger, Security in reckoning 3rd Edition, Prentice Hall, 2003 2. Jeff Crume Inside Internet Security Addison Wesley, 2003 ISM 184 reading SECURITY POLICIES IN INDUSTRY L T/P C 3 1 4 Introduction to Information Security Policies around Policies why Policies are Important When policies should be developed How Policy should be developed Policy needs Identify what and from whom it is being protected Data security consideration Backups, Archival storage and disposal of data sharp Property rights and Policies Incident Response and Forensics Management Responsibilities Role of Information Security Department Security Management and Law Enforcement Security awareness didactics and support .The student go out have to present the progress of the work through seminars and progress report. A report must be submitted to the University for valuation purpose at th e halt of the semester in a stipulate format. ISM481 THESISL T/P C 0 0 16 The student will submit a synopsis at the beginning of the semester for the approval from the frame committee in a specified format. Synopsis must be submitted within two weeks. The first defense, for the dissertation work, should be held with in two months time. Dissertation Report must be submitted in a specified format to the project committee for evaluation purpose at the end of semester.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.