Bca Ds Sem-5 Information Security Fundamentals

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Swarrnim School of Computing & IT

Course Dossier

Prof. Vikas Chandra Sharma

Bachelor of Computer Application- CTIS

Semester: V
Subject Name: INFORMATION SECURITY FUNDAMENTALS
Subject Code:
SWARRNIM STARTUP & INNOVATION UNIVERSITY
Swarrnim School of Business (BCA – Data Science)
Information Security Fundamentals
Semester: V
Code: ________

Teaching & Evaluation Scheme:-


Teaching Scheme Evaluation Scheme

Credits Internal External Total


Th Tu Pr Total

Th Pr Th Pr
2 - - 2 2 30 - 70 - 100

Objective:

 This course primarily focuses on the types of threats, vulnerabilities, risks and other
various concepts that about Information Security

 It explains the formation of security policy at various levels inside the Organization and
provides the definition procedures, standard and guidelines

 The modules emphasizes the need for performing asset classification and
declassification, retention and disposal of information asset

 It identifies the various levels of authorization for access Viz., owner, custodian and user.

 The course covers the different types of access controls and physical security measures to
safeguard the assets and conclusively

 it deals with the digital rights management also covering the concepts of common
authentication protocols and real world protocols.

Sr. Course Contents Number


No. of Hours
1 Module 1: Introduction to Information Security 9
Definition of Information Security, Evolution of Information
Security; Basics Principles of Information Security; Critical Concepts
of Information Security; Components of the Information System;
Balancing Information Security and Access; Implementing IT
Security, The system Development Life cycle, Security professional
in the organization

2 Module 2: The Need for IT Security Business Needs- 9


Protecting the functionality, Enabling the safe operations, Protecting
the data, safe guarding the technology assets; Threats-compromises to
Intellectual property, deliberate software attacks, Espionage and
trespass, sabotage and vandalism; Attacks-Malicious Codes, Back
Doors, Denial of Service and Distributed Denial of Service,
Spoofing, sniffing, Spam, Social Engineering..

3 Module 3: Risk Management Definition of risk 9


management, risk identification, and risk control, Identifying and
Accessing Risk, Assessing risk based on probability of occurrence
and likely impact, the fundamental aspects of documenting risk via
the process of risk assessment, the various risk mitigation strategy
options, the categories that can be used to classify controls

4 Module 4: Network Infrastructure Security and Connectivity 9


Understanding Infrastructure Security- Device Based
Security, Media-Based Security, Monitoring and Diagnosing;
Monitoring Network- Firewall, Intrusion Detection System, Intrusion
Prevention system; OS and Network Hardening, Application
Hardening; Physical and Network Security- Policies, Standards and
Guidelines

10.

Learning Outcomes:-

1 Students will be able to understand the importance of securing data, the concepts of IT
security, threats, vulnerabilities, impact and control measures

2 They get to familiarize with asset management along with the objective to create awareness in
digital rights management

Textbooks:

1 Information Security Risk Analysis Thomas R. Peltier Third Edition, Pub: Auerbach, 2012
Reference Books:
1 Operating System Concepts Abraham Silberschatz 8th EditionJohn Wiley & sons, Inc., 2009
Module 1: Introduction to Information Security:
1. Definition of Information Security:
- Information Security refers to the protection of information and data from unauthorized
access, use, disclosure, disruption, modification, or destruction.

2. Evolution of Information Security:


- Information Security has evolved over time due to the increasing reliance on digital
technologies and the internet, leading to new threats and challenges.

3. Basics Principles of Information Security:


- Confidentiality: Ensuring that information is accessible only to authorized individuals.
- Integrity: Maintaining the accuracy and completeness of data and information.
- Availability: Ensuring that information is accessible and usable when needed.

4. Critical Concepts of Information Security:


- Threat: A potential danger that could exploit a vulnerability and cause harm.
- Vulnerability: Weaknesses or flaws in the system that can be exploited by threats.
- Risk: The likelihood of a threat exploiting a vulnerability, leading to potential harm.

5. Components of the Information System:


- Hardware: Physical devices like computers, servers, routers, etc.
- Software: Programs and applications used to process and manage data.
- Data: Information stored in various forms, such as databases, files, etc.
- People: Users and administrators who interact with the system.

6. Balancing Information Security and Access:


- It involves finding the right balance between implementing strong security measures and
allowing appropriate access to authorized users for business operations.

7. Implementing IT Security:
- This includes the use of various security measures, such as firewalls, encryption, access
controls, and regular security assessments, to protect the information system from threats.

8. The System Development Life Cycle (SDLC):


- SDLC is a structured approach to develop, maintain, and replace an information system. It
includes phases like planning, analysis, design, implementation, and maintenance.

9. Security Professional in the Organization:


- Roles of security professionals involve designing, implementing, and managing security
measures to safeguard the organization's information and systems from potential threats.

You might also like