0% found this document useful (0 votes)
36 views

BSBC 604 Informationsecurity

The document discusses information security concepts across four main sections. Section A covers information security principles like classification, policies, roles, and balancing access with security. Section B discusses security threats, vulnerabilities, and tools like firewalls. Section C is about security management, access control, intrusion detection, laws, and standards. Section D focuses on cryptography techniques including symmetric, asymmetric algorithms and digital signatures. The document also lists three suggested books on information security, cyber laws, and cryptography.

Uploaded by

Surinder Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

BSBC 604 Informationsecurity

The document discusses information security concepts across four main sections. Section A covers information security principles like classification, policies, roles, and balancing access with security. Section B discusses security threats, vulnerabilities, and tools like firewalls. Section C is about security management, access control, intrusion detection, laws, and standards. Section D focuses on cryptography techniques including symmetric, asymmetric algorithms and digital signatures. The document also lists three suggested books on information security, cyber laws, and cryptography.

Uploaded by

Surinder Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

BSBC604InformationSecurity

SectionA:

Information Security Concepts : Information Security Overview: Background and Current


Scenario, Principles ofSecurity- Information Classification, Policy Framework, Role based
Security in an organization, Components of Information Systems, Balancing Information Security
andAccess, Approaches toinformation Security Implementation, Security Systems
DevelopmentLifeCycle.

SectionB:

Security Threats and Vulnerabilities: Overview of Threats and Vulnerabilities-Intruders,


MaliciousSoftware,Virusesand related Threats,DesktopSecurity,Emailsecurity:PGPand
S/MIME,WebSecurity:Webauthentication,SSLandSET,DatabaseSecurity. Firewalls-
Overview,DesignprinciplesandTypes.

SectionC:

SecurityManagement andLaws:Introduction toSecurityManagement, AccessControland


IntrusionDetection,OverviewofIdentificationandAuthorization, IntrusionDetectionSystems
andIntrusionPreventionSystems,SecurityProceduresandGuidelines,BusinessEthicsand
BestPractices, Security Assurance, Security Laws, IPR,International Security Standards,
SecurityAudit,SSE-CMM/COBITetc.

SectionD:

Cryptography:ConceptsandTechniques,SymmetricandAsymmetricKey Cryptography,
Steganography, SymmetricKeyCiphers-DES,AES(StructureandAnalysis).AsymmetricKey Ciphers-
PrinciplesofPublicKeycryptosystems,RSAAlgorithmandits Analysis.Digital Signatures.

SuggestedBooks

1)IntroductiontoInformationSecurityandCyberLawsPaperback-bySuryaPrakashTripathi
(Author),RitendraGoel(Author),PraveenKumarShukla(Author)

2)PrinciplesofInformationSecurity.Paperback-byWhitman(Author)

3)CryptographyandInformationSecurityPaperback–byPachghareV.K.(Author)

You might also like