Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

JNTUH COLLEGE OF ENGINEERING HYDERABAD

Dept of Computer Science and Engineering

IV Year B.Tech. CSE I-Sem B. Tech. (Computer Science) - IDDMP

SECURITY IN COMPUTING

Unit I

Security Problem in Computing

Computer Security, Threats, Attacks, Computer Criminals, Defense Methods,

Cryptography

Symmetric and Public-key Encryption, Uses of Encryption.

Unit II

Program Security
Secure Programs, Viruses and other Malicious Code, Control against Program Threats
Protection in General-Purpose OS
Protected Objects and Methods of Protection, Memory and Address Protection, Control of Access to General
Objects, File Protection Mechanism, User Authentication.

Unit III

Designing Trusted OS

What is Trusted System?, Security Policies, Models of Security, Trusted Operating System Design

Database and Data Mining Security

Security Requirements, Reliability and Integrity, Sensitive Data, Inference, Multilevel Databases, Proposals
for Multilevel Security, Data Mining

Unit IV

Security in Networks

Threats in Networks, Network Security Controls, Firewalls, Intrusion Detection System, Secure E-Mail

Administering Security

Security Planning, Organizational Security Policies, Physical Security

Economics of Cybersecurity

Quantifying Security, Modeling Cybersecurity, Current Research and Future directions


Unit V

Privacy in Computing

Privacy Concepts, Privacy Principles and Policies, Authentication and Privacy, Privacy on the Web

Legal and Ethical Issues in Computer Security

Protecting Programs and Data, Computer Crime, Ethical Issues in Computer Security, Case Studies of Ethics

Security in Service-Oriented Architecture (SOA)

Web Services, XML Firewalls

Prescribed Text Book


C. P. Fleeger and S. L. Fleeger, Security in Computing, Pears

Department of Computer Engineering

Course Plan

Academic year 2020-21

(Faculty: B SIDDARTH )

3. Course Plan/Schedule:

No. of
S. No. Topics / Sub. Topics / Experiments Classes Remarks
Estimated
1 UNIT I 2

Security Problem in Computing

Computer Security, Threats, Attacks,


Computer Criminals, Defense
Methods,

2 Cryptography 2

Symmetric and Public-key


Encryption, Uses of Encryption.
3 1
Uses of Encryption.

4 UNIT II 2

Program Security
Secure Programs, Viruses and other
Malicious Code, Control against
Program Threats

5 2
Protection in General-Purpose OS
Protected Objects and Methods
of Protection, Memory and
Address Protection

6 Control of Access to General Objects, 1


File Protection Mechanism, User
Authentication.

UNIT III 2
7
Designing Trusted OS

What is Trusted System?, Security


Policies, Models of Security, Trusted
Operating System Design

8 2

Database and Data Mining Security

Security Requirements, Reliability


and Integrity, Sensitive Data,
Inference, Multilevel Databases,
Proposals for Multilevel Security,
Data Mining

9 Unit IV 2

Security in Networks

Threats in Networks, Network


Security Controls, Firewalls, Intrusion
Detection System, Secure E-Mail
10 Administering Security 2

Security Planning, Organizational


Security Policies, Physical Security

11 1
Economics of Cybersecurity

Quantifying Security, Modeling


Cybersecurity, Current Research and
Future directions

12 Unit V 2

Privacy in Computing

Privacy Concepts, Privacy Principles


and Policies, Authentication and
Privacy, Privacy on the Web

13 Legal and Ethical Issues in 2


Computer Security

Protecting Programs and Data,


Computer Crime, Ethical Issues in
Computer Security, Case Studies of
Ethics

14 Security in Service-Oriented 2
Architecture (SOA)

Web Services, XML Firewalls

You might also like