Syllabus - Security Assessment and Risk Analysis (IO - 503 (A))
CSE-IOT/IOT
Security Assessment and Risk Analysis (IO - 503 (A))
V-Semester
Unit I
SECURITY BASICS
Information Security (INFOSEC) Overview: critical information characteristics – availability information states – processing security countermeasures-education, training and awareness, critical information characteristics – confidentiality critical information characteristics – integrity, information states – storage, information states – transmission, security countermeasurespolicy, procedures and practices, threats, vulnerabilities.
Unit II
Threats to and Vulnerabilities of Systems
Threats, major categories of threats (e.g., fraud, Hostile Intelligence Service (HOIS). Countermeasures: assessments (e.g., surveys, inspections). Concepts of Risk Management: consequences (e.g., corrective action, risk assessment), cost/benefit analysis and implementation of controls, monitoring the efficiency and effectiveness of controls (e.g., unauthorized or inadvertent disclosure of information).
Unit III
Security Planning
directives and procedures for policy mechanism. Contingency Planning/Disaster Recovery: agency response procedures and continuity of operations, contingency plan components, determination of backup requirements, development of plans for recovery actions after a disruptive event.
Unit IV
Personnel Security Practices and Procedures
access authorization/verification (need- to-know), contractors, employee clearances, position sensitivity, security training and awareness, systems maintenance personnel.
Auditing and Monitoring
conducting security reviews, effectiveness of security programs, investigation of security breaches, privacy review of accountability controls, review of audit trails and logs.
Unit V
Operations Security (OPSEC)
OPSEC surveys/OPSEC planning INFOSEC: computer security – audit, cryptography-encryption (e.g., point-to-point, network, link). Case study of threat and vulnerability assessment.
Course Objective
Describe the concepts of risk management in information security Define and differentiate various Contingency Planning components. Define and be able to discuss incident response options, and design an Incident Response Plan for sustained organizational operations.
Course Outcome
["To apply contingency strategies including data backup and recovery and alternate site selection for business resumption planning", "To Skilled to be able to describe the escalation process from incident to disaster in case of security disaster.", "To Design a Disaster Recovery Plan for sustained organizational operations."]
Practicals
Reference Books
-
Information Systems Security, 2ed: Security Management, Metrics, Frameworks and Best Practices, Nina Godbole, John Wiley & Sons.
-
Principles of Incident Response and Disaster Recovery, Whitman & Mattord, Course Technology ISBN: 141883663X.