Bca Ds Sem-5 Information Security Fundamentals
Bca Ds Sem-5 Information Security Fundamentals
Bca Ds Sem-5 Information Security Fundamentals
Course Dossier
Semester: V
Subject Name: INFORMATION SECURITY FUNDAMENTALS
Subject Code:
SWARRNIM STARTUP & INNOVATION UNIVERSITY
Swarrnim School of Business (BCA – Data Science)
Information Security Fundamentals
Semester: V
Code: ________
Th Pr Th Pr
2 - - 2 2 30 - 70 - 100
Objective:
This course primarily focuses on the types of threats, vulnerabilities, risks and other
various concepts that about Information Security
It explains the formation of security policy at various levels inside the Organization and
provides the definition procedures, standard and guidelines
The modules emphasizes the need for performing asset classification and
declassification, retention and disposal of information asset
It identifies the various levels of authorization for access Viz., owner, custodian and user.
The course covers the different types of access controls and physical security measures to
safeguard the assets and conclusively
it deals with the digital rights management also covering the concepts of common
authentication protocols and real world protocols.
10.
Learning Outcomes:-
1 Students will be able to understand the importance of securing data, the concepts of IT
security, threats, vulnerabilities, impact and control measures
2 They get to familiarize with asset management along with the objective to create awareness in
digital rights management
Textbooks:
1 Information Security Risk Analysis Thomas R. Peltier Third Edition, Pub: Auerbach, 2012
Reference Books:
1 Operating System Concepts Abraham Silberschatz 8th EditionJohn Wiley & sons, Inc., 2009
Module 1: Introduction to Information Security:
1. Definition of Information Security:
- Information Security refers to the protection of information and data from unauthorized
access, use, disclosure, disruption, modification, or destruction.
7. Implementing IT Security:
- This includes the use of various security measures, such as firewalls, encryption, access
controls, and regular security assessments, to protect the information system from threats.