Вы находитесь на странице: 1из 2

Lucknow Institute of Technology,

Lucknow
Department of C.S. & I.T.
Lecture & Lesson Plan (2010-2011)

Sub Code : EIT- 505


Sub Name : Information Security and Cyber
Laws Semester : Fifth
Total no of lecture : 48(L) + 4(T)
Prepared By : Ms Mariah

Ref. No Topics Lecture Remark


UNIT 1
History of Information Systems and its Importance,
1.1 2
basics
Changing Nature of Information
1.2 2
Systems, Need of Distributed Information Systems
1.3 Information System Threats and attacks 2
Classification of Threats and Assessing Damages
1.4 Security in Mobile and Wireless Computing- Security 3
Challenges in Mobile Devices
Security Implication for organizations, Laptops Security
1.5 2
Basic Principles of Information Security
Confidentiality, Integrity Availability and other terms
1.6 2
in Information Security
1.7 Information Classification and their Roles 2
T-1
UNIT 2
Security Threats to E Commerce, Virtual Organization,
2.1 3
Business Transactions on Web, E Governance and EDI
Concepts in Electronics payment systems, E Cash,
2.2 2
Credit/Debit Cards
Physical Security- Needs, Disaster and Controls, Basic
2.3 Tenets of Physical Security and Physical 3
Entry Controls
Access Control- Biometrics, Factors in Biometrics
Systems, Benefits, Criteria for selection of
2.4 biometrics, Design Issues in Biometric Systems, 4
Interoperability Issues, Economic and Social
Aspects, Legal Challenges
T-2
UNIT 3
3.1 Model of Cryptographic Systems, Issues in Documents 4
Security, System of Keys, Public Key
Cryptography, Digital Signature, Requirement of Digital
Signature System, Finger Prints,
Firewalls, Design and Implementation Issues, Policies
Network Security- Basic Concepts, Dimensions,
Perimeter for Network Protection, Network
3.2 4
Attacks, Need of Intrusion Monitoring and Detection,
Intrusion Detection
Virtual Private Networks- Need, Use of Tunneling with
VPN, Authentication Mechanisms,
3.4 4
Types of VPNs and their Usage, Security Concerns in
VPN
T-3
UNIT 4
4.1 Security metrics- Classification and their benefits 2
Information Security & Law, IPR, Patent Law, Copyright
4.2 Law, Legal Issues in Data mining 3
Security, Building Security into Software Life Cycle
Ethics- Ethical Issues, Issues in Data and Software
4.3 2
Privacy
4.4 Cyber Crime Types & overview of Cyber Crimes 2
T-4

References:
1. Godbole,“ Information Systems Security”, Willey
2. Merkov, Breithaupt,“ Information Security”, Pearson Education
3. Yadav, “Foundations of Information Technology”, New Age, Delhi
4. Schou, Shoemaker, “Information Assurance for the Enterprise”, Tata
McGraw Hill
5. Sood,“Cyber Laws Simplified”, Mc Graw Hill
6. Furnell, “Computer Insecurity”, Springer
7. IT Act 2000

Вам также может понравиться