Monday, May 20, 2019
Information Security and Management Syllabus Essay
Confidentiality and pledge, protective covering Policy and trading operations Life Cycle, Security System Development and Operations batten down profitsing Threats The Attack Process. Attacker Types. Vulnerability Types. Attack Results. Attack Taxonomy. Threats to Security Physical security, Biometric systems, monitoring controls, and info security and intrusion and detection systems. Encryption Techniques Conventional techniques, Modern techniques, DES, DES chaining, Triple DES, RSA algorithm, Key management. communicate Authentication and Hash Algorithm, Authentication requirements and functions secure Hash Algorithm, Message digest algorithm, digital signatures.AES Algorithms. aiming Secure Net leans Components of a Hardening Strategy. Network Devices. Host Operating Systems. Applications. Appliance-Based Network Services. Rogue Device Detection, Network Security Technologies The Difficulties of Secure Networking. Security Technologies. Emerging Security Technologies Gener al Design Considerations, Layer 2 Security Considerations. IP Addressing Design Considerations. ICMP Design Considerations. Routing Considerations. Transport Protocol Design Considerations. Network Security Platform Options Network Security Platform Options.Network Security Device Best Pr fleckices, Common Application Design Considerations. E-Mail. DNS. HTTP/HTTPS. FTP. Instant Messaging. IPsec VPN Design Considerations VPN Basics. Types of IPsec VPNs. IPsec Modes of Operation and Security Options. Topology Considerations. Design Considerations. Site-to-Site Deployment Examples. Secure Network direction and Network Security Management Organizational Realities. Protocol Capabilities. Tool Capabilities. Secure Management Design Options. Network Security Management, Firewalls, Trusted systems, IT act and cyber laws. Text Books 1.Sean Convery, Network Security Architectures, Published by Cisco Press, First Ed. 2004 2. William Stalling Cryptography and Network Security Fourth Ed. , Pre ntice Hall, 2006 Reference Books 1. Charles P. Pfleeger, Shari honorrence Pfleeger, Security in Computing 3rd Edition, Prentice Hall, 2003 2. Jeff Crume at bottom Internet Security Addison Wesley, 2003 ISM 184 INFORMATION SECURITY POLICIES IN INDUSTRY L T/P C 3 1 4 Introduction to In pution Security PoliciesAbout Policies why Policies atomic number 18 Important When policies should be developed How Policy should be developed Policy needs Identify what and from whom it is beingness protected Data security consideration Backups, Archival storage and disposal of data Intellectual plaza rights and Policies Incident Response and Forensics Management Responsibilities Role of Information Security Department Security Management and Law Enforcement Security awareness training and support .The school-age child will have to present the progress of the work through seminars and progress report. A report must be submitted to the University for evaluation purpose at the extirp ate of the semester in a specified format. ISM481 THESISL T/P C 0 0 16 The student will submit a synopsis at the beginning of the semester for the approval from the project committee in a specified format. Synopsis must be submitted within two weeks. The first defense, for the dissertation work, should be held with in two months time. Dissertation Report must be submitted in a specified format to the project committee for evaluation purpose at the end of semester.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment