0% found this document useful (0 votes)
325 views2 pages

DIS Syllabus

The document outlines the syllabus for the Data and Information Security course at Anna University, detailing objectives, course units, and outcomes. It covers topics such as information security fundamentals, legal and ethical issues, digital signatures, email and IP security, and web security protocols. The course aims to equip students with knowledge and skills relevant to various aspects of information security.

Uploaded by

Gayathri Meena G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
325 views2 pages

DIS Syllabus

The document outlines the syllabus for the Data and Information Security course at Anna University, detailing objectives, course units, and outcomes. It covers topics such as information security fundamentals, legal and ethical issues, digital signatures, email and IP security, and web security protocols. The course aims to equip students with knowledge and skills relevant to various aspects of information security.

Uploaded by

Gayathri Meena G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ANNA UNIVERSITY: CHENNAI

AFFILIATED INSTITUTIONS – REGULATIONS 2021


DEPARTMENT OF COMPUTER SCIENCE AND BUSINESS SYSTEMS
SYLLABUS

CW3551 DATA AND INFORMATION SECURITY LTPC


3003
OBJECTIVES:
 To understand the basics of Information Security
 To know the legal, ethical and professional issues in Information Security.
 To equip the students’ knowledge on digital signature, email security and web security
UNIT I INTRODUCTION 9
History, what is Information Security? Critical Characteristics of Information, NSTISSC
Security Model, Components of an Information System, Securing the Components,
Balancing Security and Access, The SDLC, The Security SDLC.
UNIT II SECURITY INVESTIGATION 9
Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues -
An Overview of Computer Security - Access Control Matrix, Policy-Security policies,
Confidentiality policies, Integrity policies and Hybrid policies
UNIT III DIGITAL SIGNATURE AND AUTHENTICATION 9
Digital Signature and Authentication Schemes: Digital Signature-Digital Signature Schemes
and their Variants- Digital Signature Standards-Authentication: Overview- Requirements
Protocols - Applications - Kerberos -X.509 Directory Services
UNIT IV E-MAIL AND IP SECURITY 9
E-mail and IP Security: Electronic mail security: Email Architecture -PGP – Operational
Descriptions- Key management- Trust Model- S/MIME.IP Security: Overview- Architecture
- ESP, AH Protocols IPsec Modes – Security association - Key management.
UNIT V WEB SECURITY 9
Web Security: Requirements- Secure Sockets Layer- Objectives-Layers -SSL secure
Communication-Protocols - Transport Level Security. Secure Electronic Transaction- Entities
DS Verification-SET processing.
COURSE OUTCOMES:
CO1: Understand the basics of data and information security.
CO2: Understand the legal, ethical and professional issues in information security.
CO3: Understand the various authentication schemes to simulate different applications.
CO4: Understand various security practices and system security standards
CO5: Understand the Web security protocols for E-Commerce applications.
TOTAL:45 PERIODS
TEXT BOOKS
1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security,
Course Technology, 6th Edition, 2017.
2. Stallings William. Cryptography and Network Security: Principles and Practice,
Seventh Edition, Pearson Education, 2017.
REFERENCES
1. Harold F. Tipton, Micki Krause Nozaki,, “Information Security Management
Handbook, Volume 6, 6th Edition, 2016
2. Stuart McClure, Joel Scrambray, George Kurtz, “Hacking Exposed”, McGraw-
Hill, Seventh Edition, 2012
3. Matt Bishop, “Computer Security Art and Science, Addison Wesley Reprint Edition,
2015
4. Behrouz A Forouzan, Debdeep Mukhopadhyay, Cryptography And network
security, 3rd Edition, McGraw-Hill Education, 2015
CO’s- PO’s & PSO’s MAPPING
CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
1 3 2 1 1 1 - 1 2 1 - - - 3 3 2 1
2 3 3 2 1 1 - 2 3 1 - - - 3 3 2 1
3 3 2 2 1 1 - 2 3 1 - - - 3 3 2 1
4 3 2 2 1 1 - 2 3 1 - - - 3 3 2 1
5 3 2 1 1 1 - 2 3 1 - - - 3 3 2 1
AVg. 3 2.2 1.6 1 1 - 2 3 1 - - - 3 3 2 1
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

You might also like