Reference-Material- Information security
Reference-Material- Information security
Class: AP2023246000602
Information Security
05/02/2025 1
Information Security – What?
Information Security (Info Sec) protects sensitive
business information by mitigating information risks
05/02/2025 2
Cybersecurity Vs Information Security
Cybersecurity
• Cybersecurity is concerned with protecting electronic devices
and mobile devices against attacks in cyberspace
• Example: Network Security, Application Security, Cloud
Security, Critical Infrastructure
Info Sec
• Info Sec is concerned with protecting the confidentiality,
integrity, and availability of information
• Example: Procedural Control, Assess Control, Technical
Controls, Compliance Control
05/02/2025 3
Careers Opportunities
Security Analyst
Chief Information Officer
Security Architect
Forensics
Cybersecurity Analyst
Cybersecurity Manager
Cybersecurity Consultant
05/02/2025 4
How Can you Make?
05/02/2025 5
Information Security – CSE4032
WINTER 2023-2024
VIT-AP University
05/02/2025 6
Course Details
T P C 3 2 4
05/02/2025 7
Objectives
• To study security principles, practices, methods, and tools.
• To investigate and understand threats to your organization's
digital assets and the tools and methods used to mitigate
those threats.
05/02/2025 8
Course Outcomes
Class
Course Session
Outcomes Course Outcome Statement PO's / PEO's s
CO2
Analyze and evaluate the security policies and PO2,PO5, PO3, PO4, PO7, PO10, 9
system design. PO11
CO3
Investigate the logic-based system with the PO2,PO5, PO3, PO4, PO7, PO10, 9
enterprise security specifications. PO11
Analyze and test the Operating Systems and
CO4
Database security systems. PO1,PO2,PO3, PO4, PO5, PO6 9
05/02/2025 9
Modules
Module No. 1 -Introduction
Module No. 2 – Access Control Models
Module No. 3 – Security Policies
Module No. 4 – System Design
Module No. 5 – Logic Based System
Module No. 6 – Operating System and Database System Security
05/02/2025 10
Module No. 1 - Introduction
• Overview of Security Parameters: Confidentiality, integrity and
availability
• Security Violation and Threats
• Security Policy and Procedure
• Assumption of Trust
• Security Assumption, Implementation, and Operational Issues
• Security life Cycle
05/02/2025 11
Module No. 2 - Access Control
Models
• Discretionary
• Mandatory
• Role-based and Task-based models
• Unified models
• Access Control Algebra
• Temporal and Spatio-temporal model
05/02/2025 12
Module No. 3 – Security Policies
• Confidentiality Policies
• Integrity Policies
• Hybrid Policies
• International Standards
05/02/2025 13
Module No. 4 – Systems Design
• Design Principles
• Representing Identity
• Confinement Problem
• Assurance
• Building Systems with Assurance
• Formal Methods
• Evaluating Systems
05/02/2025 14
Module No. 5 – Logic based System
• Malicious Logic • Special Topics
• Vulnerability Analysis Data Privacy
• Auditing Introduction to digital Forensics
• Intrusion Detection Enterprise Security Specification.
• Applications:
Network Security
Operating System Security
User Security
Program Security
05/02/2025 15
Module No. 6 – Operating System
and Database System Security
• Operating System Security
Security Architecture
Analysis of Security in Linux/Windows
• Database Security
Security Architecture
Enterprise Security
Database Auditing
05/02/2025 16
Lab Exercise
Analysis of security in Unix/Linux.
Administration of users, password policies, privileges
and roles
05/02/2025 17
Text Books & References
05/02/2025 18
References
1. Security in Computing, C.P. Pfleeger, S.L. Pfleeger, J. Margulies,2015
2. Secure Programming HOWTO, David Wheeler,2018
3. Browser Security Handbook, Michael Zalewski,2011.
4. Handbook of Database Security, M. Gertz, S. Jajodia,2010.
05/02/2025 19
Any Queries?
05/02/2025 20