Subject Details
Dept     : AIDS
Sem      : 5
Regul    : 2019
Faculty : Dr Indu Nair.V
phone  : 8248770284
E-mail  : indu.v.ece@snsce.ac.in
538
Page views
26
Files
3
Videos
4
R.Links

Icon
Syllabus

UNIT
1
INTRODUCTION TO CYBER SECURITY

Introduction - Computer Security - Threats -Harm - Vulnerabilities - Controls - Authentication - Access Control and Cryptography – Web User Side - Browser Attacks - Web Attacks Targeting Users - Obtaining User or Website Data - Email Attacks

UNIT
2
SECURITY IN OPERATING SYSTEM & NETWORKS

Security in Operating Systems - Security in the Design of Operating Systems - Rootkit - Network security attack - Threats to Network Communications - Wireless Network Security - Denial of Service - Distributed Denial-of-Service.

UNIT
3
DEFENCES: SECURITY COUNTER MEASURES

Cryptography in Network Security - Firewalls - Intrusion Detection and Prevention Systems - Network Management - Databases - Security Requirements of Databases - Reliability and Integrity - Database Disclosure - Data Mining and Big Data.

UNIT
4
PRIVACY IN CYBERSPACE

Privacy Concepts -Privacy Principles and Policies -Authentication and Privacy – Data Mining -Privacy on the Web - Email Security - Privacy Impacts of Emerging Technologies - Where the Field Is Headed.

UNIT
5
MANAGEMENT AND INCIDENTS

Security Planning - Business Continuity Planning - Handling Incidents - Risk Analysis - Dealing with Disaster - Emerging Technologies - The Internet of Things - Economics - Electronic Voting - Cyber Warfare- Cyberspace and the Law - International Laws – Cyber crime - Cyber Warfare and Home Land Security.

Reference Book:

1. George K. Kostopoulous, Cyber Space and Cyber Security, CRC Press, 2013. 2. Martti Lehto, Pekka Neittaanmäki, Cyber Security: Analytics, Technology and Automation edited, Springer International Publishing Switzerland 2015 3. Nelson Phillips and Enfinger Steuart, ―Computer Forensics and Investigations‖, Cengage Learning, New Delhi, 2009.

Text Book:

1.Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in Computing, 5th Edition , Pearson Education , 2015