Page 4 - DCAP516_COMPUTER_SECURITY
P. 4
SYLLABUS
Computer Security
Objectives: To enable the student to understand various threats and security policies for computer systems. Student will learn:
cryptography, authorization issues, database security issues, network security issues, design of trusted operating system.
Sr. No. Description
1. An Overview of Computer Security: Basic Components, Threats, Goals of Security, Protection State, Assurance
and Operational Issues.
2. Information & Network Security Policies: What is a security policy, Types of security polices – Confidentiality
policies, Integrity policies, Hybrid policies.
3. Cryptography: What is Cryptography, Substitution Ciphers. Transposition (Permutations). Making “Good”
Encryption Algorithms. The Data Encryption Standard (DES). The AES Encryption Algorithm. Public Key
Encryption. The Uses of Encryption.
4. Access Control Mechanisms: Access Control Lists, Abbreviations, Creation & Maintenance, Revocation of
Rights, Ring based Access Control, Propagated access Control Lists.
5. User Authentication: Basics, Passwords as Authenticators, Attacks on Passwords, Password Selection Criteria,
Authentication Process, Biometrics.
6. Designing Trusted Operating Systems: What Is a Trusted System? Security Policies, Models of Security,
Trusted Operating System Design, Assurance in Trusted Operating Systems.
7. Database Security: Introduction to Databases, Security Requirements, Reliability and Integrity, Sensitive Data,
Inference, Multilevel Databases, Proposals for Multilevel Security.
8. Security in Networks: Network Concepts, Threats in Networks, Network Security Controls, Firewalls.
Intrusion Detection Systems, Secure E-Mail.