An Overview of Computer Security, Access Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid policies.
UNIT II
Cryptography- Key management – Session and Interchange keys, Key exchange and generation, Cryptographic Key Infrastructure, Storing and Revoking Keys, Digital Signatures, Cipher Techniques
UNIT III
Systems: Design Principles, Representing Identity, Access Control Mechanisms, Information Flow and Confinement Problem.
UNIT IV
Malicious Logic, Vulnerability Analysis, Auditing and Intrusion Detection
UNIT V
Network Security, System Security, User Security and Program Security
TEXT BOOK:
1. Matt Bishop ,“Computer Security art and science ”, Second Edition, Pearson Education
REFERENCES:
1. Mark Merkow, James Breithaupt “ Information Security : Principles and Practices” First Edition, Pearson Education,
2 .Whitman, “Principles of Information Security”, Second Edition, Pearson Education William Stallings, “Cryptography and Network Security: Principles and Practices”,
Third Edition, Pearson Education.
3. “Security in Computing ”, Charles P.Pfleeger and Shari Lawrence Pfleeger, Third Edition.
No comments:
Post a Comment