0% found this document useful (0 votes)
23 views

Lesson Plan Theory DIS

The document outlines a lesson plan for the subject 'Data and Information Security' for the academic year 2024-2025 at Anand Institute of Higher Technology. It includes course objectives, outcomes, a detailed lesson schedule, and assessment methods, along with specific guidelines on formatting and queries related to changes. The lesson plan emphasizes various aspects of information security, including legal issues, digital signatures, and web security protocols.

Uploaded by

vimalrajas.csbs
Copyright
© © All Rights Reserved
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Lesson Plan Theory DIS

The document outlines a lesson plan for the subject 'Data and Information Security' for the academic year 2024-2025 at Anand Institute of Higher Technology. It includes course objectives, outcomes, a detailed lesson schedule, and assessment methods, along with specific guidelines on formatting and queries related to changes. The lesson plan emphasizes various aspects of information security, including legal issues, digital signatures, and web security protocols.

Uploaded by

vimalrajas.csbs
Copyright
© © All Rights Reserved
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 10

1 Don't edit Yellow color cells in both sheets

2 Don't change the format


3 Only when taking print out you can change the format but don't save it.
4 For any queries related to changing the format to be discussed with IQAC
ANAND INSTITUTE OF HIGHER TECHNOLOGY, Kazhipattur, Chennai-603 103.
LESSON PLAN - THEORY
DEPARTMENT OF COMPUTER SCIENCE AND BUSINESS SYSTEMS

Name of the Subject DATA AND INFORMATION SECURITY Regulation 2021


Subject Code CW3551 Year/Sem III / 5
Academic Year 2024-2025 ODD Batch A
Course Objectives
To understand the basics of Information Security
To know the legal, ethical and professional issues in Information Security
To equip the students’ knowledge on digital signature, email security and web security
Course Outcomes
At the end of the course the students would be able to
CO1: Understand the basics of data and information security
CO2:Understand the legal, ethical and professional issues in information security
CO3: Understand the various authentication schemes to simulate different applications.
CO4:Understand various security practices and system security standards
CO5:Understand the Web security protocols for E-Commerce applications
Blooms Level
Level 1 (L1): Remembering Level 4 (L4): Analysing
Level 2 (L2): Understanding Level 5 (L5): Evaluating
Level 3 (L3): Applying Level 6 (L6): Creating
Lesson Plan

Mode of Teaching
T/R* Periods Tentative Date Blooms Level
Sl.No. Topic(s) (BB/PPT/GL/ Pedagogical activities CO PO & PSO
Book Required of Completion (L1 - L6)
etc.)

UNIT - I 9

PO1 - PO5, PO7 -


1 History, What is Information Security?, Critical Characteristics of Information T1, R1 1 23/8/2024 BB CO1
PO9, PSO1 - PSO4
L2,L4

PO1 - PO5, PO7 -


2 NSTISSC Security Model T1, R1 1 29/8/2024 BB CO1
PO9, PSO1 - PSO4
L2,L4

PO1 - PO5, PO7 -


3 Components of an Information System T1, R1 1 30/8/2024 BB CO1
PO9, PSO1 - PSO4
L2,L4

AIHT/IQAC/LPT/01
PO1 - PO5, PO7 -
4 Securing the Components T1, R1 1 30/8/2024 BB CO1
PO9, PSO1 - PSO4
L2,L4

PO1 - PO5, PO7 -


5 Balancing Security and Access T1, R1 2 31/8/2024 BB CO1
PO9, PSO1 - PSO4
L2,L4

PO1 - PO5, PO7 -


6 The SDLC T1, R1 1 31/8/2024 BB CO1
PO9, PSO1 - PSO4
L2,L4

PO1 - PO5, PO7 -


7 The Security SDLC T1, R1 1 2/9/2024 BB CO1
PO9, PSO1 - PSO4
L2,L4

PO1 - PO5, PO7 -


9 Unit Test T1, R1 1 2/9/2024 BB CO1
PO9, PSO1 - PSO4
L2,L4
UNIT - II 9

PO1 - PO5, PO7 -


10 Need for Security, Business Needs, Threats, Attacks T2,R2 1 5/9/2024 BB CO2
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


11 Legal, Ethical and Professional Issues T2,R2 2 6/9/2024 BB CO2
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


12 An Overview of Computer Security - Access Control Matrix, T2,R2 1 9/9/2024 BB CO2
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


13 Policy-Security policies T2,R2 1 9/9/2024 BB CO2
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


14 Confidentiality policies T2,R2 1 12/9/2024 BB CO2
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


15 Integrity policies and Hybrid policies T2,R2 2 13/9/2024 BB CO2
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


16 Unit Test T2,R2 1 16/9/2024 BB CO2
PO9, PSO1 - PSO4
L1,L2,L4
UNIT - III 9

PO1 - PO5, PO7 -


17 Digital Signature and Authentication Schemes: Digital signature T1,R4 1 16/9/2024 BB CO3
PO9, PSO1 - PSO4
L1,L2,L3,L4

PO1 - PO5, PO7 -


18 Digital Signature Schemes and their Variants T1,R4 1 19/9/2024 BB CO3
PO9, PSO1 - PSO4
L1,L2,L3,L4

PO1 - PO5, PO7 -


19 Digital Signature Standards T1,R4 1 20/9/2024 BB CO3
PO9, PSO1 - PSO4
L1,L2,L3,L4

PO1 - PO5, PO7 -


20 Authentication: Overview T1,R4 1 20/9/2024 BB CO3
PO9, PSO1 - PSO4
L1,L2,L3,L4

AIHT/IQAC/LPT/01
PO1 - PO5, PO7 -
21 Requirements Protocols - T1,R4 1 23/9/2024 BB CO3
PO9, PSO1 - PSO4
L1,L2,L3,L4

23/9/2024 PO1 - PO5, PO7 -


22 Applications - Kerberos T1,R4 2 BB CO3
26/9/2024 PO9, PSO1 - PSO4
L1,L2,L3,L4

PO1 - PO5, PO7 -


23 X.509 Directory Services T1,R4 1 27/9/2024 BB CO3
PO9, PSO1 - PSO4
L1,L2,L3,L4

PO1 - PO5, PO7 -


24 Unit Test T1,R4 1 27/9/2024 BB CO3
PO9, PSO1 - PSO4
L1,L2,L3,L4
UNIT - IV 9

PO1 - PO5, PO7 -


25 E-mail and IP Security: Electronic mail security: Email Architecture T1,R4 1 28/9/2024 BB CO4
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


26 PGP – Operational Descriptions T1,R4 1 30/9/2024 BB CO4
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


27 Key management- Trust Model T1,R4 1 30/9/2024 BB CO4
PO9, PSO1 - PSO4
L1,L2,L4

3/10/2024 PO1 - PO5, PO7 -


28 S/MIME.IP Security: Overview- Architecture - ESP T1,R4 2 BB CO4
4/10/2024 PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


29 AH Protocols IPSec Modes T1,R4 1 4/10/2024 BB CO4
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


30 Security association T1,R4 1 5/10/2024 BB CO4
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


31 Key management. T1,R4 1 5/10/2024 BB CO4
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


32 Unit Test T1,R4 1 7/10/2024 BB CO4
PO9, PSO1 - PSO4
L1,L2,L4
UNIT - V 9

PO1 - PO5, PO7 -


33 Web Security: Requirements T1,R4 1 7/10/2024 BB CO5
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


34 Secure Sockets Layer- Objectives-Layers T1,R4 2 10/10/2024 BB CO5
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


35 SSL secure communication-Protocols T1,R4 2 14/10/2024 BB CO5
PO9, PSO1 - PSO4
L1,L2,L4

AIHT/IQAC/LPT/01
PO1 - PO5, PO7 -
36 Transport Level Security. T1,R4 1 17/10/2024 BB CO5
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


37 Secure Electronic Transaction T1,R4 1 18/10/2024 BB CO5
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


38 Entities DS Verification-SET processing. T1,R4 1 18/10/2024 BB CO5
PO9, PSO1 - PSO4
L1,L2,L4

PO1 - PO5, PO7 -


39 Unit Test T1,R4 1 19/10/2024 BB CO5
PO9, PSO1 - PSO4
L1,L2,L4
Content Beyond the Syllabus Planned

1 Various Cryptography Algorithms

Text Books

1 Michael E Whitman and Herbert J Mattord, “Principles of Information Security, Course Technology, 6th Edition, 2017.

2 Stallings William. Cryptography and Network Security: Principles and Practice, Seventh Edition, Pearson Education, 2017.

Reference Books

1 Harold F. Tipton, Micki Krause Nozaki,, “Information Security Management Handbook, Volume 6, 6th Edition, 2016.

2 Stuart McClure, Joel Scrambray, George Kurtz, “Hacking Exposed”, McGraw- Hill, Seventh Edition, 2012.

3 Matt Bishop, “Computer Security Art and Science, Addison Wesley Reprint Edition, 2015.

4 Behrouz A Forouzan, Debdeep Mukhopadhyay, Cryptography And network security, 3rd Edition, . McGraw-Hill Education, 2015.

Website / URL References

1 https://onlinecourses.nptel.ac.in/noc22_cs90/preview
CO PO Mapping

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3 PSO4

CO1 3 2 1 1 1 - 1 2 1 - - - 3 3 2 1

CO2 3 3 2 1 1 - 2 3 1 - - - 3 3 2 1

CO3 3 2 2 1 1 - 2 3 1 - - - 3 3 2 1

CO4 3 2 2 1 1 - 2 3 1 - - - 3 3 2 1

CO5 3 2 1 1 1 - 2 3 1 - - - 3 3 2 1

Avg 3 2.2 1.6 1 1 - 2 3 1 - - - 3 3 2 1

AIHT/IQAC/LPT/01
Assignments planned Units

Assignment -1 1,2

Assignment -2 3,4,5

Academic Calendar (Proposed Date)

MT I: 18.09.2024

MT II: 15.10.2024

Model Examination: 07.11.2024

*Kindly sign with date

Name & Sign of Faculty in charge:

Head of the Department:

Principal:

AIHT/IQAC/LPT/01
ANAND INSTITUTE OF HIGHER TECHNOLOGY, Kazhipattur, Chennai-603 103.LESSON PLAN - THEORY

ANAND INSTITUTE OF HIGHER TECHNOLOGY, Kazhipattur, Chennai-603 103.


LESSON PLAN - THEORY
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

Name of the Subject DATA AND INFORMATION SECURITY Regulation 2021


Subject Code CW3551 Year/Sem III / 5
Academic Year 2024-2025 ODD Batch A
Course Objectives
To understand the basics of Information Security
To know the legal, ethical and professional issues in Information Security
To equip the students’ knowledge on digital signature, email security and web security
#NAME?
#NAME?
Course Outcomes
At the end of the course the students would be able to
CO1: Understand the basics of data and information security
CO2:Understand the legal, ethical and professional issues in information security
CO3: Understand the various authentication schemes to simulate different applications.
CO4:Understand various security practices and system security standards
#NAME?

Lesson Plan

T/R* Periods Tentative Date of Actual Date of


Sl.No. Topic(s) Book Required Completion Completion
Periods Taken Remarks

UNIT - I 9

1 History, What is Information Security?, Critical Characteristics of Information T1, R1 1 23/8/2024

2 NSTISSC Security Model T1, R1 1 29/8/2024

3 Components of an Information System T1, R1 1 30/8/2024

4 Securing the Components T1, R1 1 30/8/2024

5 Balancing Security and Access T1, R1 2 31/8/2024

AIHT/IQAC/LPT/01
ANAND INSTITUTE OF HIGHER TECHNOLOGY, Kazhipattur, Chennai-603 103.LESSON PLAN - THEORY

6 The SDLC T1, R1 1 31/8/2024

7 The Security SDLC T1, R1 1 2/9/2024

9 Unit Test T1, R1 1 2/9/2024

UNIT - II 9

10 Need for Security, Business Needs, Threats, Attacks T2,R2 1 5/9/2024

11 Legal, Ethical and Professional Issues T2,R2 2 6/9/2024

12 An Overview of Computer Security - Access Control Matrix, T2,R2 1 9/9/2024

13 Policy-Security policies T2,R2 1 9/9/2024

14 Confidentiality policies T2,R2 1 12/9/2024

15 Integrity policies and Hybrid policies T2,R2 2 13/9/2024

16 Unit Test T2,R2 1 16/9/2024

UNIT - III 9

17 Digital Signature and Authentication Schemes: Digital signature T1,R4 1 16/9/2024

18 Digital Signature Schemes and their Variants T1,R4 1 19/9/2024

19 Digital Signature Standards T1,R4 1 20/9/2024

20 Authentication: Overview T1,R4 1 20/9/2024

21 Requirements Protocols - T1,R4 1 23/9/2024

22 Applications - Kerberos T1,R4 2 23/9/2024 26/9/2024

23 X.509 Directory Services T1,R4 1 27/9/2024

24 Unit Test T1,R4 1 27/9/2024

UNIT - IV 9

25 E-mail and IP Security: Electronic mail security: Email Architecture T1,R4 1 28/9/2024

26 PGP – Operational Descriptions T1,R4 1 30/9/2024

27 Key management- Trust Model T1,R4 1 30/9/2024

28 S/MIME.IP Security: Overview- Architecture - ESP T1,R4 2 3/10/2024 4/10/2024

29 AH Protocols IPSec Modes T1,R4 1 4/10/2024

30 Security association T1,R4 1 5/10/2024

AIHT/IQAC/LPT/01
ANAND INSTITUTE OF HIGHER TECHNOLOGY, Kazhipattur, Chennai-603 103.LESSON PLAN - THEORY

31 Key management. T1,R4 1 5/10/2024

32 Unit Test T1,R4 1 7/10/2024

UNIT - V 9

33 Web Security: Requirements T1,R4 1 7/10/2024

34 Secure Sockets Layer- Objectives-Layers T1,R4 2 10/10/2024

35 SSL secure communication-Protocols T1,R4 2 14/10/2024

36 Transport Level Security. T1,R4 1 17/10/2024

37 Secure Electronic Transaction T1,R4 1 18/10/2024

38 Entities DS Verification-SET processing. T1,R4 1 18/10/2024

39 Unit Test T1,R4 1 19/10/2024

Total Hours 45

*Kindly sign with date

Name & Sign of Faculty in charge:

Head of the Department:

Principal:

AIHT/IQAC/LPT/01
ANAND INSTITUTE OF HIGHER TECHNOLOGY, Kazhipattur, Chennai-603 103.LESSON PLAN - THEORY

AIHT/IQAC/LPT/01

You might also like