Pages

Header

Monday, November 19, 2012

CS9224 Information Security

An Overview of Computer Security, Access Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid policies.

UNIT II
Cryptography- Key management – Session and Interchange keys, Key exchange and generation, Cryptographic Key Infrastructure, Storing and Revoking Keys, Digital Signatures, Cipher Techniques

UNIT III
Systems: Design Principles, Representing Identity, Access Control Mechanisms, Information Flow and Confinement Problem.

UNIT IV
Malicious Logic, Vulnerability Analysis, Auditing and Intrusion Detection

UNIT V
Network Security, System Security, User Security and Program Security

TEXT BOOK:
1. Matt Bishop ,“Computer Security art and science ”, Second Edition, Pearson Education

REFERENCES:
1. Mark Merkow, James Breithaupt “ Information Security : Principles and Practices” First Edition, Pearson Education,
2 .Whitman, “Principles of Information Security”, Second Edition, Pearson Education William Stallings, “Cryptography and Network Security: Principles and Practices”,
Third Edition, Pearson Education.
3. “Security in Computing ”, Charles P.Pfleeger and Shari Lawrence Pfleeger, Third Edition.

No comments:

Post a Comment