Page 4 - DCAP516_COMPUTER_SECURITY
P. 4

SYLLABUS

                                                  Computer Security



          Objectives: To enable the student to understand various threats and security policies for computer systems. Student will learn:
          cryptography, authorization issues, database security issues, network security issues, design of trusted operating system.

            Sr. No.                                         Description
              1.    An Overview of Computer Security: Basic Components, Threats, Goals of Security, Protection State, Assurance
                    and Operational Issues.
              2.    Information & Network Security Policies: What is a security policy, Types of security polices – Confidentiality
                    policies, Integrity policies, Hybrid policies.
              3.    Cryptography:  What is Cryptography, Substitution Ciphers.  Transposition (Permutations). Making  “Good”
                    Encryption Algorithms. The  Data Encryption Standard (DES). The AES Encryption Algorithm. Public Key
                    Encryption. The Uses of Encryption.
              4.    Access Control  Mechanisms:  Access  Control Lists, Abbreviations, Creation & Maintenance, Revocation of
                    Rights, Ring based Access Control, Propagated access Control Lists.
              5.    User Authentication: Basics, Passwords as Authenticators, Attacks on Passwords, Password Selection Criteria,
                    Authentication Process, Biometrics.
              6.    Designing Trusted Operating Systems: What Is a Trusted System? Security Policies, Models of Security,
                    Trusted Operating System Design, Assurance in Trusted Operating Systems.
              7.    Database Security: Introduction to Databases, Security Requirements, Reliability and Integrity, Sensitive Data,
                    Inference, Multilevel Databases, Proposals for Multilevel Security.
              8.    Security in Networks: Network Concepts, Threats in Networks, Network Security Controls, Firewalls.
                    Intrusion Detection Systems, Secure E-Mail.
   1   2   3   4   5   6   7   8   9