CW3551 Data and Information Security Syllabus:

CW3551 Data and Information Security Syllabus – Anna University Regulation 2021

COURSE OBJECTIVES:

• To understand the basics of Information Security
• To know the legal, ethical and professional issues in Information Security
• To equip the students’ knowledge on digital signature, email security and web security

UNIT I INTRODUCTION

History, What is Information Security?, Critical Characteristics of Information, NSTISSC Security Model, Components of an Information System, Securing the Components, Balancing Security and Access, The SDLC, The Security SDLC

UNIT II SECURITY INVESTIGATION

Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues – An Overview of Computer Security – Access Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid policies

UNIT III DIGITAL SIGNATURE AND AUTHENTICATION

Digital Signature and Authentication Schemes: Digital signature-Digital Signature Schemes and their Variants- Digital Signature Standards-Authentication: Overview- Requirements Protocols – Applications – Kerberos -X.509 Directory Services

UNIT IV E-MAIL AND IP SECURITY

E-mail and IP Security: Electronic mail security: Email Architecture -PGP – Operational Descriptions Key management- Trust Model- S/MIME.IP Security: Overview- Architecture – ESP, AH Protocols IPSec Modes – Security association – Key management.

UNIT V WEB SECURITY

Web Security: Requirements- Secure Sockets Layer- Objectives-Layers -SSL secure communication-Protocols – Transport Level Security. Secure Electronic Transaction- Entities DS Verification-SET processing.

TOTAL :45 PERIODS

COURSE OUTCOMES:

Upon successful completion of this course, students will be able to:
CO1: Understand the basics of data and information security
CO2:Understand the legal, ethical and professional issues in information security
CO3: Understand the various authentication schemes to simulate different applications.
CO4:Understand various security practices and system security standards
CO5:Understand the Web security protocols for E-Commerce applications

TEXT BOOKS:

1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security, Course Technology, 6th Edition, 2017.
2. Stallings William. Cryptography and Network Security: Principles and Practice, Seventh Edition, Pearson Education, 2017.

REFERENCES

1. Harold F. Tipton, Micki Krause Nozaki,, “Information Security Management Handbook, Volume 6, 6th Edition, 2016.
2. Stuart McClure, Joel Scrambray, George Kurtz, “Hacking Exposed”, McGraw- Hill, Seventh Edition, 2012.
3. Matt Bishop, “Computer Security Art and Science, Addison Wesley Reprint Edition, 2015.
4. Behrouz A Forouzan, Debdeep Mukhopadhyay, Cryptography And network security, 3rd Edition, . McGraw-Hill Education, 2015.