0% found this document useful (0 votes)
23 views20 pages

Reference-Material- Information security

The document outlines a course on Information Security (CSE4032) at VIT-AP University, detailing its objectives, outcomes, and modules. It distinguishes between cybersecurity and information security, highlighting various career opportunities and average salaries in the field. The course covers topics such as access control models, security policies, system design, and operating system security, along with recommended textbooks and references.

Uploaded by

hathikh962
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views20 pages

Reference-Material- Information security

The document outlines a course on Information Security (CSE4032) at VIT-AP University, detailing its objectives, outcomes, and modules. It distinguishes between cybersecurity and information security, highlighting various career opportunities and average salaries in the field. The course covers topics such as access control models, security policies, system design, and operating system security, along with recommended textbooks and references.

Uploaded by

hathikh962
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

WELCOME!

Class: AP2023246000602

Information Security

05/02/2025 1
Information Security – What?
Information Security (Info Sec) protects sensitive
business information by mitigating information risks

05/02/2025 2
Cybersecurity Vs Information Security

Cybersecurity
• Cybersecurity is concerned with protecting electronic devices
and mobile devices against attacks in cyberspace
• Example: Network Security, Application Security, Cloud
Security, Critical Infrastructure
Info Sec
• Info Sec is concerned with protecting the confidentiality,
integrity, and availability of information
• Example: Procedural Control, Assess Control, Technical
Controls, Compliance Control

05/02/2025 3
Careers Opportunities

Security Analyst
Chief Information Officer
Security Architect
Forensics
Cybersecurity Analyst
Cybersecurity Manager
Cybersecurity Consultant

05/02/2025 4
How Can you Make?

• The average total pay of several cybersecurity jobs in the US in


October 2023, according to Glassdoor (Source: Coursera)

 Intrusion detection specialist: $71,102


 IT security administrator: $87,805
 Information security analyst: $98,497
 Cybersecurity manager: $160,020
 Chief information security officer: $301,873

05/02/2025 5
Information Security – CSE4032

WINTER 2023-2024
VIT-AP University

05/02/2025 6
Course Details

Course Title: Information Security


Course Code: CSE4032

Course Pre-requisites/ Co-requisites None

anti-requisites (if any). None

T P C 3 2 4
05/02/2025 7
Objectives
• To study security principles, practices, methods, and tools.
• To investigate and understand threats to your organization's
digital assets and the tools and methods used to mitigate
those threats.

05/02/2025 8
Course Outcomes
Class
Course Session
Outcomes Course Outcome Statement PO's / PEO's s

To understand the security issues and investigate


CO1
the various access control models. PO1,PO2,PO3, PO4, PO5, PO6
9

CO2
Analyze and evaluate the security policies and PO2,PO5, PO3, PO4, PO7, PO10, 9
system design. PO11
CO3
Investigate the logic-based system with the PO2,PO5, PO3, PO4, PO7, PO10, 9
enterprise security specifications. PO11
Analyze and test the Operating Systems and
CO4
Database security systems. PO1,PO2,PO3, PO4, PO5, PO6 9

TOTAL HOURS OF INSTRUCTIONS 45

05/02/2025 9
Modules
Module No. 1 -Introduction
Module No. 2 – Access Control Models
Module No. 3 – Security Policies
Module No. 4 – System Design
Module No. 5 – Logic Based System
Module No. 6 – Operating System and Database System Security

05/02/2025 10
Module No. 1 - Introduction
• Overview of Security Parameters: Confidentiality, integrity and
availability
• Security Violation and Threats
• Security Policy and Procedure
• Assumption of Trust
• Security Assumption, Implementation, and Operational Issues
• Security life Cycle

05/02/2025 11
Module No. 2 - Access Control
Models
• Discretionary
• Mandatory
• Role-based and Task-based models
• Unified models
• Access Control Algebra
• Temporal and Spatio-temporal model
05/02/2025 12
Module No. 3 – Security Policies

• Confidentiality Policies

• Integrity Policies

• Hybrid Policies

• Non-interference and policy composition

• International Standards

05/02/2025 13
Module No. 4 – Systems Design
• Design Principles

• Representing Identity

• Control of Access and Information Flow

• Confinement Problem

• Assurance
• Building Systems with Assurance
• Formal Methods
• Evaluating Systems
05/02/2025 14
Module No. 5 – Logic based System
• Malicious Logic • Special Topics
• Vulnerability Analysis Data Privacy
• Auditing Introduction to digital Forensics
• Intrusion Detection Enterprise Security Specification.
• Applications:
 Network Security
 Operating System Security
 User Security
 Program Security

05/02/2025 15
Module No. 6 – Operating System
and Database System Security
• Operating System Security
 Security Architecture
 Analysis of Security in Linux/Windows

• Database Security
 Security Architecture
 Enterprise Security
 Database Auditing
05/02/2025 16
Lab Exercise
 Analysis of security in Unix/Linux.
 Administration of users, password policies, privileges
and roles

05/02/2025 17
Text Books & References

1. Security Engineering, Ross Anderson,2nd Edition,2008.


2. Computer Security: Art and Science, M. Bishop, Pearson
Education,2002.
3. Information Security: Principles and Practice, M. Stamp,2011

05/02/2025 18
References
1. Security in Computing, C.P. Pfleeger, S.L. Pfleeger, J. Margulies,2015
2. Secure Programming HOWTO, David Wheeler,2018
3. Browser Security Handbook, Michael Zalewski,2011.
4. Handbook of Database Security, M. Gertz, S. Jajodia,2010.

05/02/2025 19
Any Queries?

05/02/2025 20

You might also like