CW3551 Data and information Security


  UNIT I INTRODUCTION 

  1. Critical Characteristics of Information 2

2. Components of an Information System, Securing the Components

3. The SDLC, The Security SDLC 

 UNIT II SECURITY INVESTIGATION 

1. Need for Security, Threats, Attacks, Legal, Ethical and Professional Issues 

2. An Overview of Computer Security - Access Control Matrix  Confidentiality policies, Integrity policies and Hybrid policies  

UNIT III DIGITAL SIGNATURE AND AUTHENTICATION 

1. Digital Signature Schemes and their Variants- Digital Signature Standards-Authentication: Overview

Or 

2. Requirements Protocols -Applications - Kerberos -X.509 Directory Services  

  UNIT IV E-MAIL AND IP SECURITY

Electronic mail security: Email Architecture -PGP- Trust ModelS

/MIME.IP Security: Architecture - ESP, Key management.  

UNIT V WEB SECURITY

 Requirements- Secure Sockets Layer- Objectives-Layers

SSL secure communication-Protocols - Transport Level Security. Secure Electronic Transaction

Santhosh (Admin)

TO THE ENGINEER FOR THE ENGINNEER BY AN ENGINEER Kindly join Us on social media's link at the top corner

Post a Comment

Please Select Embedded Mode To Show The Comment System.*

Previous Post Next Post