Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Subject: Information Security and Cyber Laws Year & Branch: III (V Sem.), I.T.
S.No
Unit
1
Lecture Date
Topic Covered
Hours 1
References I/1-5
1.
11-08-11 History of Information Systems and its Importance, basics, Changing Nature of Information Systems 12-08-11 Need of Distributed Information Systems Systems, Role of Internet and Web Services 18-08-11 Information System Threats and attacks, Classification of Threats and Assessing Damages 19-08-11 Security in Mobile and Wireless ComputingSecurity Challenges in Mobile Devices, authentication Service Security, Security Implication for organizations, Laptops Security 25-08-11 Basic Principles of Information Security, Confidentiality, Integrity Availability and other terms in Information Security, Information Classification and their Roles. 26-08-11 Security Threats to E-Commerce, Virtual Organization 1-09-11 2-09-11 8-09-11 9-09-11 Business Transactions on Web, E-Governance and EDI Concepts in Electronics payment systems, E Cash, Credit/Debit Cards Physical Security- Needs, Disaster and Controls, Basic Tenets of Physical Security Physical Entry Controls, Criteria for selection of biometrics, Design Issues in Biometric Systems
2. 3. 4.
1 1 1
1 1 1
5.
I/73-76
2 2 2 2 2 2 3
1 1 1 1 1 1 1
15-09-11 Interoperability Issues, Economic and Social Aspects, Legal Challenges 16-09-11 Model of Cryptographic Systems, Issues in
13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23.
3 3 3 3 3 4 4 4 4 4
All Unit
22-09-11 Public Key Cryptography, Digital signatures 23-09-11 Finger Prints, Firewalls 29-09-11 Network Security- Basic Concepts, Dimensions, Perimeter for Network Protection 30-09-11 Network Attacks, Need of Intrusion Monitoring and Detection, Intrusion Detection 7-10-11 Authentication Mechanisms, Types of VPNs and their Usage, Security Concerns in VPN
1 1 1 1 1 1 1 1 1 1 4
II/152-164 II/164-168 II/174-176 II/176-179 II/201-210 II/215-221 II/233-236 II/234-238 II/260-263 II/265-272 Through Presentation
13-10-11 Security metrics- Classification and their benefits 14-10-11 Information Security & Law, IPR, Patent Law 20-10-11 Copyright Law, Legal Issues in Data mining Security 21-10-11 Ethics- Ethical Issues, Issues in Data and Software Privacy 11-11-11 Cyber Crime Types & overview of Cyber Crimes
17-11-11 18-11-11 24-11-11 25-11-11 U2) Biometrics Systems U3) Digital Signature, Requirement of Digital Signature System, Virtual Private Networks- Need, Use of Tunneling with VPN U4)Building Security into Software Life Cycle, Cyber Crime Types & overview of Cyber Crimes
I-- Godbole, Information Systems Security, Willey IIK.K.Singh ,Information Security and Cyber Laws, Umesh Publication