Professional Documents
Culture Documents
It2042 Course Plan
It2042 Course Plan
COURSE PLAN
SEMESTER: 08 COURSE DURATION: JANUARY-APRIL 2015
FACULTY DETAILS:
1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”, Vikas Publishing House, New Delhi, 2003 Devices, Physical Security,
Security and Personnel
REFERENCE BOOKS:
1. Micki Krause, Harold F. Tipton, “ Handbook of Information Security Management”, Vol 1-3 CRC Press LLC, 2004.
2. Stuart Mc Clure, Joel Scrambray, George Kurtz, “Hacking Exposed”, Tata McGraw-Hill, 2003
3. Matt Bishop, “ Computer Security Art and Science”, Pearson/PHI, 2002
RESOURCES:
1. www.securityhelp.ru/cissp/Overley_Updated.pdf
2. csetube.blogspot.com/2013/.../it2042-it706-information-security-is_13.html
3. http://www.edunotes.in/Home
4. people.ac.upc.edu/nin/papers/LNNS.pdf
5. ceng520.cankaya.edu.tr/course.php?page=Lecture%20Notes
6. freecomputerbooks.com/compscspecialSecurityBooks.html
7. iiscs.wssu.edu/drupal/node/2991
IT 2042 – Information Security
PREREQUISITE:
1. Data Communications and Computer Networks
2. Software Engineering and project Management
Students undergoing this course are expected to Students undergoing this course are able to
1. To understand the basics of information security a) Discuss the basics of information security
2. To know the legal, ethical and professional issues in b) Illustrate the legal, ethical and professional issues in information
information security security
3. To know the aspects of risk management c) Demonstrate the aspects of risk management.
4. To become aware of various standards in this area d) Design of Security Architecture
5. To know the technological aspects of information e) Design and implementation of Security Techniques.
security
History, What is Information Security?, Critical Characteristics of Information, NSTISSC Security Model, Components of an Information System, Securing
the Components, Balancing Security and Access, The SDLC, The Security SDLC
Sessio Topics to be covered Text book Chapter Instruction Testing Instructional Instructional outcome
n No. No. and delivery method Objective
Page No
Meth Level
od
1 History, What is Michael Chapter 1 Board Understand Discussion
Information Security? E Pg 15-21 and ing
Whitman Chalk
and 1.To understand the a) Discuss the basics of
Herbert J basics of information information security
Mattord, security
“Principl
es of
Informati
on
Security”
, Vikas
Publishin
g House,
New
Delhi,
2003
Devices,
Physical
Security,
Security
and
Personnel
2 Critical Characteristics of Chapter 1 Ppt Knowledge Assignment
Information Pg 22-24 & Unit Test
IT 2042 – Information Security
3,4 NSTISSC Security Model Chapter 1 Board Knowledge Assignment
Pg 25 and and Unit Test
Chalk
5 Components of an Chapter 1 Board Knowledge Assignment
Information System Pg 26 and and Unit Test
Chalk
6 Securing the Components Chapter 1 Board Analyze Unit Test
Pg 28 and
Chalk
7 Balancing Security and Chapter 1 Board Knowledge
Access. Pg 29 and Unit Test
chalk
Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues
Sessio Topics to be covered Text book Chapter Instruction Testing Instructional Instructional outcome
n No. No. and delivary method Objective
Page No
Method Level
10 Need for Security Chapter 2 Board Understa Discussion
Pg 43-44 and nding
chalk
Michael E
b.Illustrate the legal,
Whitman 2.To know the legal,
and ethical and ethical and professional
Herbert J professional issues in issues in information
Mattord,
information security
“Principle security
s of
IT 2042 – Information Security
Informatio
n
Security”,
Vikas
Publishing
House,
New
Delhi,
2003
Devices,
Physical
Security,
Security
and
Personnel
Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk
Sessio Topics to be covered Text book Chapter Instruction Testing Instructional Instructional outcome
n No. No. and delivery method Objective
Page No
Method level
19,20, Risk Management: Chapter 4 Board Understa Discussion
21 Identifying Pg 100- and nding
103 Chalk
3. To know the aspects c).Demonstrate the
of risk management aspects of risk
management.
Michael E
Whitman
and
Herbert J
Mattord,
“Principle
s of
Informatio
n
Security”,
Vikas
Publishing
House,
New
Delhi,
2003
Devices,
Physical
Security,
Security
and
IT 2042 – Information Security
Personnel
Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access Control
Sessio Topics to be covered Text book Chapter Instruction Testing Instructional Instructional outcome
n No. No. and delivery method Objective
Page No
Method Level
37,38 Security Technology Chapter 7 Board Understa Discussion
Michael E Pg 232- and nding 5.To know the e)Design and
Whitman 279 Chalk technological aspects implementation of
and of information security Security Techniques
Herbert J
Mattord,
“Principle
s of
Informatio
n
Security”,
Vikas
Publishing
House,
New
Delhi,
2003
Devices,
Physical
Security,
Security
and
Personnel
IT 2042 – Information Security
39,40 IDS Ppt Understa Assignment
nding and Unit Test
Outcome Mapping:
PEO/ Instructional Outcome a).Discuss the basics b).Illustrate the c).Demonstrate the d).Design of e).Design and
of information legal, ethical and aspects of risk Security implementation
security professional management Architecture of Security
Techniques
issues in
information
security
Assignment-I
Question
Title Mark Level of Delivery Instructional Outcome
No
4 2
What are the multiple layers of Security?
Evaluation Procedure
Explanation about 2
authenticity
Methodology,phases,,investigation 5
2 16
Explain SDLC in detail
Explanation about 11
IT 2042 – Information Security
Physical design , logical design,
implementation maintainance & change
4 What are the multiple layers of Security? Explanation about layer topics? 2 2
Total 50
Assignment-II
Question
Title Mark Level of Delivery Instructional Outcome
No
IT 2042 – Information Security
1 2 b).Illustrate the legal, ethical and
What are the characteristics of CIA triangle? professional issues in information
security
Evaluation Procedure
Total 50
Question
Title Mark Level of Delivery Instructional Outcome
No
Evaluation Procedure
Explain Scanning and Analysis Tools in detail Explanation about Foot printing and 4
3 8
Fingerprinting?
Explain about secret key encryption algorithm Explanation about Data Encryption 2
4 10
Standard?
Total 50