Page 76 - REC :: All Dept Open Electives
P. 76

UNIT II       SECURITY IN OPERATING SYSTEM & NETWORKS                                 9
               Security  in  Operating  Systems  -  Security  in  the  Design  of  Operating  Systems  -Rootkit  -  Network
               security attack- Threats to Network Communications - Wireless Network Security - Denial of Service -
               Distributed Denial-of-Service. (Ref. Book 1: Chapter 5 and 6- Part I )


                UNIT III      DEFENCES: SECURITY COUNTERMEASURES                                      9

               Cryptography in Network Security - Firewalls - Intrusion Detection and Prevention Systems - Network
               Management - Databases - Security Requirements of Databases - Reliability and Integrity - Database
               Disclosure - Data Mining and Big Data.  (Ref. Book 1: Chapter 6 – Part II and Chapter 7)

               UNIT IV        PRIVACY IN CYBERSPACE                                                   9

               Privacy Concepts -Privacy Principles and Policies -Authentication and Privacy - Data Mining -Privacy
               on the Web - Email Security - Privacy Impacts of Emerging Technologies - Where the Field Is Headed.
               (Ref. Book 1: Chapter 9)

               UNIT V         MANAGEMENT AND INCIDENTS                                                9

               Security Planning - Business Continuity Planning - Handling Incidents - Risk Analysis - Dealing with
               Disaster - Emerging Technologies - The Internet of Things - Economics - Electronic Voting - Cyber
               Warfare- Cyberspace and the Law - International Laws - Cyber crime - Cyber Warfare and Home Land
               Security.      (Ref. Book 1: Chapter 10 and 13)

                                                                                TOTAL: 45 PERIODS

               OUTCOMES:

               At the end the student will be able to

                   1.  Compare threat, risk, attack and vulnerability.
                   2.  Security in the design of operating systems
                   3.  Analyze security counter measures
                   4.  Implement privacy principles and policies
                   5.  Inject secure coding in the developed applications

               REFERENCES

               1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in Computing, 5th Edition
               , Pearson Education , 2015

                2. George K.Kostopoulous, Cyber Space and Cyber Security, CRC Press, 2013.

                3. Martti Lehto, Pekka Neittaanmäki, Cyber Security: Analytics, Technology and Automation edited,
               Springer International Publishing Switzerland 2015

               4. Nelson Phillips and Enfinger Steuart, ―Computer Forensics and Investigations‖, Cengage Learning,
               New Delhi, 2009.







               Curriculum and Syllabus | Open Electives | R 2017 | REC                              Page 76
   71   72   73   74   75   76   77   78   79   80   81