Syllabus - INFORMATION SECURITY (CB-602)


Computer Science and Business System (CSBS)

INFORMATION SECURITY (CB-602)

VI

UNIT – I

Overview of Security Parameters

Confidentiality, integrity and availability; Security violation and threats; Security policy and procedure; Assumptions and Trust; Security Assurance, Implementation and Operational Issues; Security Life Cycle.

UNIT – II

Access Control Models

Discretionary, mandatory, role-based and task-based models, unified models, access control algebra, temporal and spatio-temporal models.

UNIT – III

Security Policies

Confidentiality policies, integrity policies, hybrid policies, non-interference and policy composition, international standards.

Systems Design

Design principles, representing identity, control of access and information flow, confinement problem.

Assurance

Building systems with assurance, formal methods, evaluating systems.

UNIT – IV

Logic-based System

Malicious logic, vulnerability analysis, auditing, intrusion detection.

Applications

Network security, operating system security, user security, program security.

Special Topics

Data privacy, to digital forensics, enterprise security specification. introduction

UNIT – V

Operating Systems Security

Security Architecture, Analysis of Security in Linux/Windows.

Database Security

Security Architecture, Enterprise security, Database auditing.

Practicals

  • Analysis of security in Unix/Linux.

  • Administration of users, password policies, privileges and roles

  • Implementation of discretionary access control and mandatory access control

  • Demonstrate intrusion detection system (ids) using any tool Eg. Snort or any other software

  • Implementation of IT audit, malware analysis and vulnerability assessment and generate the report

  • Implementation of mobile audit and generate the report of the existing artifacts

  • Implementation of OS hardening and RAM dump analysis to collect the artifacts and other information

  • Implementation of digital forensics tools for disk imaging, data acquisition, data extraction and data analysis and recovery

  • Perform mobile analysis in the form of retrieving call logs, SMS log, and all contacts list using the forensics tool like SAFT

  • Implementation to identify web vulnerabilities, using OWASP project

Reference Books

  • R. Anderson, “Security engineering”. John Wiley & Sons, 2008.

  • M. Bishop, “Computer Security: Art and Science”, Pearson Education

  • M. Stamp, “Information security: principles and practice”. John Wiley & Sons, 2014.

  • William Stallings, “Cryptography and Network Security Principles and Practice” Fourth Edition, Pearson Education.