UNIT I INTRODUCTION
1. Critical Characteristics of Information 2
2. Components of an Information System, Securing the Components
3. The SDLC, The Security SDLC
UNIT II SECURITY INVESTIGATION
1. Need for Security, Threats, Attacks, Legal, Ethical and Professional Issues
2. An Overview of Computer Security - Access Control Matrix Confidentiality policies, Integrity policies and Hybrid policies
UNIT III DIGITAL SIGNATURE AND AUTHENTICATION
1. Digital Signature Schemes and their Variants- Digital Signature Standards-Authentication: Overview
Or
2. Requirements Protocols -Applications - Kerberos -X.509 Directory Services
UNIT IV E-MAIL AND IP SECURITY
Electronic mail security: Email Architecture -PGP- Trust ModelS
/MIME.IP Security: Architecture - ESP, Key management.
UNIT V WEB SECURITY
Requirements- Secure Sockets Layer- Objectives-Layers
SSL secure communication-Protocols - Transport Level Security. Secure Electronic Transaction