0% found this document useful (0 votes)
17 views2 pages

BCO 030A Principles of Information System Security 3-0-0 (3) Objective

The document outlines a course on Information Security, covering objectives, threats, and policies related to information security. It includes topics such as cryptography, message authentication, network security layers, and countermeasures against intruders and viruses. The course aims to equip students with the ability to analyze security trade-offs, implement security measures, and understand the creation of security policies for organizations.

Uploaded by

Anukriti Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views2 pages

BCO 030A Principles of Information System Security 3-0-0 (3) Objective

The document outlines a course on Information Security, covering objectives, threats, and policies related to information security. It includes topics such as cryptography, message authentication, network security layers, and countermeasures against intruders and viruses. The course aims to equip students with the ability to analyze security trade-offs, implement security measures, and understand the creation of security policies for organizations.

Uploaded by

Anukriti Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

PRINCIPLES OF INFORMATION SYSTEM

BCO 030A 3-0-0 [3]


SECURITY
Objective:
 To explain the objectives of information security
 To analyse the trade-offs inherent in security
 To describe the enhancements made to IPv4 by IPSec
 To understand the basic categories of threats to computers and networks
 To discuss issues for creating security policy for a large organization

Information Security: Introduction, History of Information security, What is


Security, CNSS Security Model, Components of Information System,
UNIT 1
Balancing Information Security and Access, Approaches to Information
Security Implementation, The Security Systems Development Life Cycle.
Cryptography: Concepts and Techniques, symmetric and asymmetric key
cryptography, steganography, Symmetric key Ciphers: DES structure, DES
Analysis, Security of DES, variants of DES, Block cipher modes of
UNIT 2
operation , AES structure, Analysis of AES , Key distribution Asymmetric
key Ciphers: Principles of public key cryptosystems, RSA algorithm,
Analysis of RSA, Diffie-Hellman Key exchange
Message Authentication and Hash Functions: Authentication requirements
UNIT 3 and functions, MAC and Hash Funtions, MAC Algorithms: Secure Hash
Algorithm, Whirlpool, HMAC, Digital signatures, X.509, Kerberos
Security at layers(Network, Transport, Application): IPSec, Secure Socket
UNIT 4 Layer(SSL), Transport Layer Security(TLS), Secure Electronic
Transaction(SET), Pretty Good Privacy(PGP), S/MIME
Inruders, Virus and Firewalls: Intruders, Intrusion detection, password
UNIT 5 management, Virus and related threats, Countermeasures, Firewall design
principles, Types of firewalls

OUTCOMES: At the end of the course, the student should be able to:
CO1: Explain the objectives of information security and analyze the importance of information
Security in real world.
CO2: Analyse the trade-offs inherent in security and designing and analysis of different encryption
Algorithms.
CO3: Implementation of MAC and Hash functions, security at different layers of a network
CO4: Understand the basic categories of threats to computers and networks and explore different
types of intruders and viruses.
CO5: Discuss issues for creating security policy for a large organization
MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM
OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:
Course Program Outcome Program
Outcome Specifice
Outcome
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3

CO1 H H M M M
CO2 H H H M M M
CO3 H L H
CO4 L H M L
CO5 M H H H M L M M

H = Highly Related; M = Medium L=Low

Text Books –
1. Stalling Williams: Cryptography and Network Security: Principles and Practices, 4th Edition,
Pearson Education, 2006.
2. Kaufman Charlie et.al; Network Security: Private Communication in a Public World, 2nd Ed.,
PHI/Pearson.
Reference Books:
1. Pieprzyk Josef and et.al; Fundamentals of Computer Security, Springer-Verlag, 2008.
2. Trappe & Washington, Introduction to Cryptography, 2nd Ed. Pearson.

You might also like