Sei sulla pagina 1di 2

HINDUSTAN INSTITUTE OF TECHNOLOGY AND MANAGEMENT, KEETAM, AGRA Lecture Plan

Subject: Information Security and Cyber Laws Year & Branch: III (V Sem.), I.T.
S.No

Subject Code: EIT-505 Faculty: PRAMOD KUMAR

Unit
1

Lecture Date

Topic Covered

Hours 1

References I/1-5

1.

11-08-11 History of Information Systems and its Importance, basics, Changing Nature of Information Systems 12-08-11 Need of Distributed Information Systems Systems, Role of Internet and Web Services 18-08-11 Information System Threats and attacks, Classification of Threats and Assessing Damages 19-08-11 Security in Mobile and Wireless ComputingSecurity Challenges in Mobile Devices, authentication Service Security, Security Implication for organizations, Laptops Security 25-08-11 Basic Principles of Information Security, Confidentiality, Integrity Availability and other terms in Information Security, Information Classification and their Roles. 26-08-11 Security Threats to E-Commerce, Virtual Organization 1-09-11 2-09-11 8-09-11 9-09-11 Business Transactions on Web, E-Governance and EDI Concepts in Electronics payment systems, E Cash, Credit/Debit Cards Physical Security- Needs, Disaster and Controls, Basic Tenets of Physical Security Physical Entry Controls, Criteria for selection of biometrics, Design Issues in Biometric Systems

2. 3. 4.

1 1 1

1 1 1

I/3-10 I/9-14 I/5-10

5.

I/73-76

6. 7. 8. 9. 10. 11. 12.

2 2 2 2 2 2 3

1 1 1 1 1 1 1

II/64-96 II/94-96 II/102-112 II/116-118 II/122-129 II/138-142 II/149-155

15-09-11 Interoperability Issues, Economic and Social Aspects, Legal Challenges 16-09-11 Model of Cryptographic Systems, Issues in

Documents Security, System of Keys

13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23.

3 3 3 3 3 4 4 4 4 4
All Unit

22-09-11 Public Key Cryptography, Digital signatures 23-09-11 Finger Prints, Firewalls 29-09-11 Network Security- Basic Concepts, Dimensions, Perimeter for Network Protection 30-09-11 Network Attacks, Need of Intrusion Monitoring and Detection, Intrusion Detection 7-10-11 Authentication Mechanisms, Types of VPNs and their Usage, Security Concerns in VPN

1 1 1 1 1 1 1 1 1 1 4

II/152-164 II/164-168 II/174-176 II/176-179 II/201-210 II/215-221 II/233-236 II/234-238 II/260-263 II/265-272 Through Presentation

13-10-11 Security metrics- Classification and their benefits 14-10-11 Information Security & Law, IPR, Patent Law 20-10-11 Copyright Law, Legal Issues in Data mining Security 21-10-11 Ethics- Ethical Issues, Issues in Data and Software Privacy 11-11-11 Cyber Crime Types & overview of Cyber Crimes
17-11-11 18-11-11 24-11-11 25-11-11 U2) Biometrics Systems U3) Digital Signature, Requirement of Digital Signature System, Virtual Private Networks- Need, Use of Tunneling with VPN U4)Building Security into Software Life Cycle, Cyber Crime Types & overview of Cyber Crimes

I-- Godbole, Information Systems Security, Willey IIK.K.Singh ,Information Security and Cyber Laws, Umesh Publication

Potrebbero piacerti anche