Cyber Security
Introduction- Introduction to Information Systems, Types of Information
Systems, Development of Information Systems, Introduction to Information
Security, Need for Information Security, Threats to Information Systems,
Information Assurance, Cyber Security, and Security Risk Analysis.
Application Security- (Database, E-mail and Internet), Data Security
Considerations-Backups, Archival Storage and Disposal of Data, Security
Technology-Firewall and VPNs, Intrusion Detection, Access Control. Security
Threats -Viruses, Worms, Trojan Horse, Bombs, Trapdoors, Spoofs, E-mail
Viruses, Macro Viruses, Malicious Software, Network and Denial of Services
Attack, Security Threats to E-Commerce- Electronic Payment System, e- Cash,
Credit/Debit Cards. Digital Signature, Public Key Cryptography
Developing Secure Information Systems- Application Development
Security, Information Security Governance & Risk Management, Security
Architecture & Design Security Issues in Hardware, Data Storage &
Downloadable Devices, Physical Security of IT Assets, Access Control, CCTV
and Intrusion Detection Systems, Backup Security Measures.
Security Policies- Development of Policies, WWW Policies, Email Security
Policies, Policy Review Process-Corporate Policies-Sample Security Policies,
Publishing and Notification Requirement of the Policies.
Evolving Technology Security – Mobile, Cloud, Outsourcing, SCM.
Information Security Standards-ISO, IT Act, Copyright Act, Patent Law,
IPR. Cyber Laws in India; IT Act 2000 Provisions, Intellectual Property Law:
Copy Right Law, Software License, Semiconductor Law and Patent Law.
Case Study – Corporate Security