0% found this document useful (0 votes)
13 views2 pages

Syllabus

Uploaded by

953623243030
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

Syllabus

Uploaded by

953623243030
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Department of Artificial Intelligence and Data Science

Academic Year 2025-2026(Odd)


SYLLABUS
Degree, Semester & Branch: B. TECH, Artificial Intelligence and Data Science
Name of the Faculty Member: S. Pradeepha
Course Code & Title: CW3551 & Data and Information Security LTPC
300 3
COURSE OBJECTIVES:
 To understand the basics of Information Security
 To know the legal, ethical and professional issues in Information Security
 To equip the students’ knowledge on digital signature, email security and web security

UNIT I- INTRODUCTION 9
History, what is Information Security? Critical Characteristics of Information, NSTISSC
Security Model, Components of an Information System, Securing the Components,
Balancing Security and Access, The SDLC, The Security SDLC
UNIT II -SECURITY INVESTIGATION 9
Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues -
An Overview of Computer Security - Access Control Matrix, Policy-Security policies,
Confidentiality policies, Integrity policies and Hybrid policies
UNIT III -DIGITAL SIGNATURE AND AUTHENTICATION 9
Digital Signature and Authentication Schemes: Digital Signature-Digital Signature Schemes
and their Variants- Digital Signature Standards-Authentication: Overview- Requirements
Protocols - Applications - Kerberos -X.509 Directory Services 83
UNIT IV- E-MAIL AND IP SECURITY 9
E-mail and IP Security: Electronic mail security: Email Architecture -PGP – Operational
Descriptions- Key management- Trust Model- S/MIME.IP Security: Overview- Architecture
- ESP, AH Protocols IPSec Modes – Security association - Key management.
UNIT V- WEB SECURITY 9
Web Security: Requirements- Secure Sockets Layer- Objectives-Layers -SSL secure
Communication-Protocols - Transport Level Security. Secure Electronic Transaction- Entities
DS Verification-SET processing. TOTAL :45
PERIODS COURSE OUTCOMES: Upon successful completion of this course, students
will be able to:
CO1: Understand the basics of data and information security
CO2: Understand the legal, ethical and professional issues in information security
CO3: Understand the various authentication schemes to simulate different applications.
CO4: Understand various security practices and system security standards
CO5: Understand the Web security protocols for E-Commerce applications

TEXT BOOKS:
1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security, Course
Technology, 6th Edition, 2017.
2. Stallings William. Cryptography and Network Security: Principles and Practice, Seventh
Edition, Pearson Education, 2017.
REFERENCES
1. Harold F. Tipton, Micki Krause Nozaki,, “Information Security Management Handbook,
Volume 6, 6th Edition, 2016.
2.Stuart McClure, Joel Scrambray, George Kurtz, “Hacking Exposed”, McGraw- Hill,
Seventh Edition, 2012.
3. Matt Bishop, “Computer Security Art and Science, Addison Wesley Reprint Edition, 2015.
4. Behrouz A Forouzan, Debdeep Mukhopadhyay, Cryptography And network security, 3rd
Edition, . McGraw-Hill Education, 2015

You might also like