Vous êtes sur la page 1sur 3

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Kirumampakkam, Pondy Cuddalore Road,


Puducherry-605 402

Department of Computer Science and Engineering


Year/Sem: Y4/S7 Subject code: CS T83
Subject: Information Security Regulations : 2013-14

Course Objectives:

1. To provide an understanding of principal concepts, major issues, technologies and basic


approaches in information security.
2. Develop an understanding of information assurance as practiced in computer operating
systems, distributed systems, networks and representative applications.
3. Gain familiarity with prevalent network and distributed system attacks, defenses against
them and forensics to investigate the aftermath.
4. Develop a basic understanding of cryptography, how it has evolved and some key encryption
techniques used today.
5. Develop an understanding of security policies (such as authentication, integrity and
confidentiality), as well as protocols to implement such policies in the form of message
exchanges.

Topics/ Syllabus: Fundamentals-Security Investigation-Security Analysis-Logical Design-


Physical Design

GRADING OF EXISTING SYLLABUS: Excellent

Course Outcomes:

On successful completion of the module students will be able to:


1. To master information security governance, and related legal and regulatory issues
2. To be familiar with how threats to an organization are discovered, analyzed, and dealt with
3. To be familiar with network security threats and countermeasures
4. To be familiar with network security designs using available secure solutions (such as PGP,
SSL, IPSec, etc)
5. To be familiar with advanced security issues and technologies (such as DDoS attack
detection and containment, and anonymous communications,)

CONTENT-BEYOND-SYLLABUS: Indian Cyber Laws for Information security issues at Indian


context.
MAPPING OF COURSE OBJECTIVES (CO) WITH EXPECTED OUTCOME (EO)

Expected Outcomes(EO)
Course
Objectives(CO)
a b c d e

5
RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY
Kirumampakkam, Pondy Cuddalore Road,
Puducherry-605 402
Department of Computer Science and Engineering
Year/Sem: Y4/S8 Subject code: CS T83
Subject: Information Security Regulations : 2013-14
Facutly : Dr K. Shantha Kumari Date of Submission: Dec 23, 2016

1. To provide an understanding of principal concepts, major issues, technologies and


basic approaches in information security.
2. Develop an understanding of information assurance as practiced in computer
operating systems, distributed systems, networks and representative applications.
3. Gain familiarity with prevalent network and distributed system attacks, defenses
Objective against them and forensics to investigate the aftermath.
4. Develop a basic understanding of cryptography, how it has evolved and some key
encryption techniques used today.
5. Develop an understanding of security policies (such as authentication, integrity and
confidentiality), as well as protocols to implement such policies in the form of
message exchanges.
Prerequisite
Knowledge for Awareness of Computer Networks , Internet Technologies, Cryptography and other
Complete learning security standards,Social media etc.
of Subject
1.To master information security governance, and related legal and regulatory issues
2.To be familiar with how threats to an organization are discovered, analyzed, and
dealt with
Benefit /
3.To be familiar with network security threats and countermeasures
Application
4.To be familiar with network security designs using available secure solutions (such
Of this subject as PGP, SSL, IPSec, etc)
5.To be familiar with advanced security issues and technologies (such as DDoS attack
detection and containment, and anonymous communications,)
Text Books: 1. Michael E Whitman and Herbert J Mattord, Principles of Information
Security, Vikas Publishing House, New Delhi, 2003.
Reference Books:
1. Micki Krause, Harold F. Tipton, Handbook of Information Security
Management, Vol 1-3 CRC Press LLC, 2004.
Important Books / 2. Stuart Mc Clure, Joel Scrambray, George Kurtz, Hacking Exposed, Tata
Journals for McGraw- Hill, 2003
learning 3. Matt Bishop, Computer Security Art and Science , Pearson/PHI, 2002.
Website:
1. http://www.cryptography.com/
2. https://www.schneier.com/cryptography.html
3. http://www.information-security-policies-and-standards.com/
4. www.jhuapl.edu/ourwork/nsa/

SUBJECT TEACHER HOD