Syllabus - Security Assessment and Risk Analysis (IO - 503 (A))


CSE-IOT/IOT

Security Assessment and Risk Analysis (IO - 503 (A))

V-Semester

Unit I

SECURITY BASICS

Information Security (INFOSEC) Overview: critical information characteristics – availability information states – processing security countermeasures-education, training and awareness, critical information characteristics – confidentiality critical information characteristics – integrity, information states – storage, information states – transmission, security countermeasurespolicy, procedures and practices, threats, vulnerabilities.

Unit II

Threats to and Vulnerabilities of Systems

Threats, major categories of threats (e.g., fraud, Hostile Intelligence Service (HOIS). Countermeasures: assessments (e.g., surveys, inspections). Concepts of Risk Management: consequences (e.g., corrective action, risk assessment), cost/benefit analysis and implementation of controls, monitoring the efficiency and effectiveness of controls (e.g., unauthorized or inadvertent disclosure of information).

Unit III

Security Planning

directives and procedures for policy mechanism. Contingency Planning/Disaster Recovery: agency response procedures and continuity of operations, contingency plan components, determination of backup requirements, development of plans for recovery actions after a disruptive event.

Unit IV

Personnel Security Practices and Procedures

access authorization/verification (need- to-know), contractors, employee clearances, position sensitivity, security training and awareness, systems maintenance personnel.

Auditing and Monitoring

conducting security reviews, effectiveness of security programs, investigation of security breaches, privacy review of accountability controls, review of audit trails and logs.

Unit V

Operations Security (OPSEC)

OPSEC surveys/OPSEC planning INFOSEC: computer security – audit, cryptography-encryption (e.g., point-to-point, network, link). Case study of threat and vulnerability assessment.

Course Objective

Describe the concepts of risk management in information security Define and differentiate various Contingency Planning components. Define and be able to discuss incident response options, and design an Incident Response Plan for sustained organizational operations.

Course Outcome

["To apply contingency strategies including data backup and recovery and alternate site selection for business resumption planning", "To Skilled to be able to describe the escalation process from incident to disaster in case of security disaster.", "To Design a Disaster Recovery Plan for sustained organizational operations."]

Practicals

Reference Books

  • Information Systems Security, 2ed: Security Management, Metrics, Frameworks and Best Practices, Nina Godbole, John Wiley & Sons.

  • Principles of Incident Response and Disaster Recovery, Whitman & Mattord, Course Technology ISBN: 141883663X.