0% found this document useful (0 votes)
54 views5 pages

Cw3551-Dis Lesson Plan

The document outlines a lesson plan for the Data and Information Security course at Mohamed Sathak Engineering College for the academic year 2024-2025. It includes course objectives, outcomes, topics covered in each unit, suggested activities, evaluation methods, and references. The plan emphasizes understanding information security fundamentals, legal and ethical issues, digital signatures, email and IP security, and web security protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views5 pages

Cw3551-Dis Lesson Plan

The document outlines a lesson plan for the Data and Information Security course at Mohamed Sathak Engineering College for the academic year 2024-2025. It includes course objectives, outcomes, topics covered in each unit, suggested activities, evaluation methods, and references. The plan emphasizes understanding information security fundamentals, legal and ethical issues, digital signatures, email and IP security, and web security protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 5

MOHAMED SATHAK ENGINEERING COLLEGE

Kilakarai- 623806
STAFF NAME : Mrs.A.Ruba
LESSON PLAN
Department of Information Technology
Name of the
Data and Information Security Regulation 2021
Subject

Course Code/ C502 / CW3551


Year / Sem III / V
Subject Code

Academic Year 2024-2025 Batch 2022-2026

Course Objective
-To understand the basic sof Information Security -
To know the legal, ethical and professional issues in Information Security
-To equip the students’knowledge on digital signature,email security and web
security
CO1: Understand the basics of data and information
Coursesecurity
Outcome

CO2: Understand the legal, ethical and professional issues in information security
CO3: Understand the various authentication schemes to simulate different applications.
CO4: Understand various security practices and system security standards
CO5: Understand the Web security protocols for E-Commerce applications Mode of
T / R* Teaching
Sl. Periods (Google Blooms Level
Topic(s) Required Meet/WB / PPT / (L1-L6)
CO
No. Book
NPTEL / MOOC /
etc )
UNIT I :INTRODUCTION
1 History T2 1 WB L2 CO1

2 What is Information Security? T2 1 WB L2 CO1

3 Critical Characteristics of Information, T2 1 WB L4 CO1

4 NSTISSC Security Model T2 1 WB L6 CO1

5 Components of an Information System T2 1 WB L2 CO1

6 Securing the Components T2 1 WB L3 CO1

7 Balancing Security and Access T2 1 WB L4 CO1

8 The SDLC T2 1 WB L5 CO1

9 The Security SDLC T2 1 WB L4 CO1


Suggested Activity: Assignment / Case Studies / Tuorials/ Quiz / Mini Projects / Model Developed/others Planned if any.
Assignment
Evaluation method: Assignment

UNIT II: SECURITY INVESTIGATION

10 Need for Security, Business Needs T1 1 WB L2 CO2


11 Threats, Attacks T1 1 WB L1 CO2

12 Legal, Ethical and Professional Issues T1 1 WB L2 CO2

13 An Overview of Computer Security T1 1 WB L4 CO2

14 Access Control Matrix T1 1 WB L4 CO2

15 Policy-Security policies,Confidentiality policies T1 1 WB L5 CO2

16 Integrity policies and Hybrid policies T1 1 WB L4 CO2


Suggested Activity: Assignment / Case Studies / Tuorials/ Quiz / Mini Projects / Model Developed/others Planned if any

Evaluation method: Assignment

UNIT III: DIGITAL SIGNATURE AND AUTHENTICATION


Digital Signature and Authentication Schemes:
17 T1 1 WB L4 CO3
Digital
Digital signature-
Signature Schemes and their Variants-
Digital Signature Standards-Authentication:
18 T1 1 WB L3 CO3
Overview- Requirements Protocols - Applications
- Kerberos -X.509 Directory Services
19 digital signature Standards T1 1 WB L4 CO3

20 Authentication: Overview T1 1 WB L5 CO3

21 Requirements Protocols T1 1 WB L4 CO3

22 Applications T1 1 WB L3 CO3

23 Kerberos T1 1 WB L3 CO3

24 X.509 Directory Services T1 1 WB L2 CO3


Suggested Activity: Assignment / Case Studies / Tuorials/ Quiz / Mini Projects / Model Developed/others Planned if any
Assignment
Evaluation method: Seminar

UNIT IV: E-MAIL AND IP SECURITY

25 E-mail and IP Security T2 1 WB L2 CO4

26 Electronic mail security-Email Architecture T2 1 WB L2 CO4

27 PGP-Operational Descriptions T2 1 WB L2 CO4

28 Key management- Trust Model T2 1 WB L2 CO4

29 S/MIME.IP Security: Overview T2 1 WB L2 CO4

30 Architecture - ESP, AH Protocols IPSec Modes T2 1 WB L5 CO4

31 Security association - Key management T2 1 WB L3 CO4


Suggested Activity: Assignment / Case Studies / Tuorials/ Quiz / Mini Projects / Model Developed/others Planned if any
Quiz
Evaluation method: Assignment

UNIT V: WEB SECURITY

32 Web Security: Requirements T2 1 WB L2 CO5


33 Secure Sockets Layer- Objectives-Layers T2 1 WB L2 CO5

34 SSL secure communication T2 1 WB L2 CO5

35 Protocols - Transport Level Security T2 1 WB L4 CO5

36 Secure Electronic Transaction T2 1 WB L3 CO5


Entities DS
37 Verification T2 1 WB L4 CO5

38 SET processing T2 1 WB L4 CO5

Suggested Activity: Assignment / Case Studies / Tuorials/ Quiz / Mini Projects / Model Developed/others Planned if any

Evaluation method: Seminar


Content Beyond the Syllabus Planned
1 Cybersecurity

2 Websecurity attacks

Text Books & Reference Books

TEXTBOOK
1. MichaelEWhitmanandHerbertJMattord,“PrinciplesofInformationSecurity,Course Technology, 6th Edition, 2017.
2. StallingsWilliam.CryptographyandNetworkSecurity:PrinciplesandPractice,Seventh Edition, Pearson Education, 2017.
REFERENCES
1. Harold F. Tipton, Micki Krause Nozaki,, “Information Security Management Handbook, Volume 6, 6th Edition, 2016.
2. StuartMcClure,JoelScrambray,GeorgeKurtz,“HackingExposed”,McGraw-Hill, Seventh Edition, 2012.
3. MattBishop,“Computer SecurityArtandScience,AddisonWesleyReprintEdition, 2015.
4. Behrouz A Forouzan, Debdeep Mukhopadhyay, Cryptography And network security, 3rd Edition, . McGraw-Hill Education, 2015.

Website / URL References


1 www.lsisreviving.weebly.com
Blooms Level

Level 1 (L1) : Remembering Level 4 (L4) : Analysing


Lower Fixed
Level 2 (L2) : Understanding Order Hour Level 5 (L5) : Evaluating Higher
Lower
Thinking Exams Order
order
Thinking
Level 3 (L3) : Applying Level 6 (L6) : Creating
Mapping syllabus with Bloom’s Taxonomy LOT and HOT
Unit No Unit Name L1 L2 L3 L4 L5 L6 LOT HOT
DIGITAL SIGNATURE AND
Unit 1 AUTHENTICATION
INTRODUCTION
0 3 0 1 0 2 3 3

Unit 2 DIGITAL
SECURITYSIGNATURE AND
INVESTIGATION 1 2 0 3 1 0 3 4
AUTHENTICATION
Unit 3 0 1 3 3 1 0 4 4

Unit 4 E-MAIL AND IP SECURITY 0 5 1 0 1 0 6 1

Unit 5 WEB SECURITY 0 3 1 3 0 0 4 3

Total 1 14 5 10 3 2 20 15

CO PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1

CO1 3 2 3 1 - - - - 1 3 1 2 3

CO2 1 3 3 3 2 - - - 1 2 2 2 1

CO3 2 3 3 3 1 - - - 1 3 1 2 1

CO4 3 3 1 1 1 - - - 3 1 1 3 3

CO5 3 2 2 3 2 - - - 1 2 1 2 2

Avg 2.4 2.60 2.40 2.20 1.50 - - - 1.40 2.20 1.20 2.20 2.00

3 High level 2 Moderate level 1 Low level

Name & Sign of Faculty Incharge : Ms.A.Ruba

Name & Sign of Subject Expert :

Head of the Department :


PSO2

2.00

level

You might also like