• Tidak ada hasil yang ditemukan

Introduction

Dalam dokumen M.Tech.(CNIS)-2017-2018.pdf (Halaman 73-78)

Introduction to Databases Security Problems in Databases Security Controls Conclusions Security Models -1

Introduction Access Matrix Model Take-Grant Model Acten Model PN Model Hartson and Hsiao's Model Fernandez's Model Bussolati and Martella's Model for Distributed databases UNITII

SecurityModels-2 Bell and LaPadula's Model Biba's Model Dion's Model Sea View Model Jajodia and Sandhu's

Model The Lattice Model for the Flow Control conclusion Security Mechanisms

Introduction User Identification/Authentication Memory Protection Resource Protection Control Flow Mechanisms Isolation Security Functionalities in Some Operating Systems Trusted

Computer System Evaluation Criteria UNIT III

Security Software Design

Introduction A Methodological Approach to Security Software Design Secure Operating System Design Secure DBMS Design Security Packages Database Security Design UNIT IV

Statistical Database Protection & Intrusion Detection Systems

Introduction Statistics Concepts and Definitions Types of Attacks Inference Controls evaluation Criteria for Control Comparison .Introduction IDES System RETISS System ASES System Discovery

UNIT V

Models For The Protection Of New Generation Database Systems -1

Introduction A Model for the Protection of Frame Based Systems A Model for the Protection of Object-Oriented Systems SORION Model for the Protection of Object-Oriented Databases Models For The Protection Of New Generation Database Systems -2

A Model for the Protection of New Generation Database Systems: the Orion Model Jajodia and Kogan's Model A Model for the Protection of Active Databases Conclusions.

TEXT BOOKS:

1. Database Security and Auditing, Hassan A. Afyouni, India Edition, CENGAGE Learning, 2009.

2. Database Security, Castano, Second edition, Pearson Education.

MASTER OF TECHNOLOGY

(COMPUTER NETWORKS & INFORMATION SECURITY) I YEAR II SEMESTER

NS2P42 PROFESSIONAL ELECTIVE – IV WIRELESS SECURITY UNIT – I

Security Issues in Mobile Communication: Mobile Communication History, Security – Wired Vs Wireless, Security Issues in Wireless and Mobile Communications, Security Requirements in Wireless and Mobile Communications, Security for Mobile Applications, Advantages and Disadvantages of Application – level Security

UNIT – II

Security of Device, Network, and Server Levels: Mobile Devices Security Requirements, Mobile Wireless network level Security, Server Level Security

UNIT – III

Application Level Security in Cellular Networks: Generations of Cellular Networks, Security Issues and attacks in cellular networks, GSM Security for applications, GPRS Security for applications, UMTS security for applications, 3G security for applications, Some of Security and authentication Solutions

UNIT – IV

Application Level Security in MANETs: MANETs, Some applications of MANETs, MANET Features, Security Challenges in MANETs, Secutiry Atacks on MANETs, External Threats for MANET applications, Internal threats for MANET Applications, Some of the Security Solutions

UNIT – V

Security for mobile commerce applications: M-Commerce Applications, M-Commerce Initiatives, Security Challenges in mobile e-commerce, Types of attacks on mobile e-commerce, A Secure M-commerce model based on wireless local area network, Some of M-Commerce Security Solutions.

TEXT BOOKS:

1. Wireless & Mobile Network Security: Pallapa Venkataram, Satish Babu, TMH, 2010.

2. Fundamentals of Mobile and Pervasive Computing, Frank Adelstein, K.S.Gupta et al, TMH 2005.

REFERENCES:

1. Wireless Security Models, Threats and Solutions, Randall k. Nichols, Panos C.

Lekkas, TMH, 2006.

2. 802.11 Security, Bruce Potter & Bob Fleck, SPD O’REILLY 2005.

3. Guide to Wireless Network Security, Springer.

4. Hacking Exposed Wireless: Johnny Cache, 2nd Edition, Joshua Wright, Vincent Lu, Mc Graw Hill.

MASTER OF TECHNOLOGY

(COMPUTER NETWORKS & INFORMATION SECURITY) I YEAR II SEMESTER

NS2P43 PROFESSIONAL ELECTIVE – IV SOFTWARE SECURITY ENGINEERING Objectives:

• Students will demonstrate knowledge of the distinction between critical and non-critical systems.

• Students will demonstrate the ability to manage a project including planning, scheduling and risk assessment/management.

• Students will author a software requirements document.

• Students will demonstrate an understanding of the proper contents of a software requirements document.

• Students will author a formal specification for a software system.

• Students will demonstrate an understanding of distributed system architectures and application architectures.

• Students will demonstrate an understanding of the differences between real-time and non-real time systems.

• Students will demonstrate proficiency in rapid software development techniques.

• Students will be able to identify specific components of a software design that can be targeted for reuse.

• Students will demonstrate proficiency in software development cost estimation.

• Students will author a software testing plan.

UNIT – I

Security a software Issue: introduction, the problem, Software Assurance and Software Security, Threats to software security, Sources of software insecurity, Benefits of Detecting Software Security

What Makes Software Secure: Properties of Secure Software, Influencing the security properties of software, Asserting and specifying the desired security properties

UNIT – II

Requirements Engineering for secure software: Introduction, the SQUARE process Model, Requirements elicitation and prioritization

UNIT – III

Secure Software Architecture and Design: Introduction, software security practices for architecture and design: architectural risk analysis, software security knowledge for architecture and design: security principles, security guidelines and attack patterns

Secure coding and Testing: Code analysis, Software Security testing, Security testing considerations throughput the SDLC

UNIT – IV

Security and Complexity: System Assembly Challenges: introduction, security failures, functional and attacker perspectives for security analysis, system complexity drivers and security

UNIT – V Governance and Managing for More Secure Software: Governance and security, Adopting an enterprise software security framework, How much security is enough?, Security and project management, Maturity of Practice.

TEXT BOOKS:

1. Software Security Engineering: Julia H. Allen, Pearson Education

REFERNCES:

1. Developing Secure Software: Jason Grembi, Cengage Learning 2. Software Security : Richard Sinn, Cengage Learning

MASTER OF TECHNOLOGY

(COMPUTER NETWORKS & INFORMATION SECURITY) I YEAR II SEMESTER

NS2P44 PROFESSIONAL ELECTIVE – IV INFORMATION SYSTEMS CONTROL AND AUDIT

Objectives:

To understand the foundations of information systems auditing To understand the management, application control framework

To understand about the evidence collection and evidence evaluation process UNIT- I

Overview of Information System Auditing, Effect of Computers on Internal Controls, Effects of Computers on Auditing, Foundations of information Systems Auditing, Conducting an Information Systems Audit. The management Control Framework-I: Introduction, Evaluating the planning Function, Evaluating the Leading Function, Evaluating the Controlling Function, Systems Development Management Controls, Approaches to Auditing Systems Development, Normative Models of the Systems Development Process, Evaluating the Major phases in the Systems Development Process, Programming Management Controls, Data Resource Management Controls.

UNIT- II

The Management Control Framework-II: Security Management Controls, Operations management Controls Quality assurance Management Controls.

The Application Control Framework-I: Boundary Controls, Input Controls, Communication Controls.

UNIT-III

The Application Control Framework-II: Processing Controls, Database Controls, output Controls.

UNIT- IV

Evidence Collection: Audit Software, Code Review, Test Data, and Code Comparison, Concurrent Auditing techniques, Interviews, Questionnaires, and Control Flowcharts.

Performance Management tools.

UNIT -V

Evidence Evaluation: Evaluating Asset Safeguarding and Data Integrity, Evaluating System Effectiveness, Evaluating System Efficiency.

TEXT BOOKS:

1. Ron Weber, Information Systems Control and Audit, Pearson Education, 2002.

REFERENCES:

1. M.Revathy Sriram, Systems Audit, TMH, New Delhi, 2001.

2. Jalote : Software Project Management in Practice, Pearson Education 3. Royce : Software Project Management, Pearson Education.

MASTER OF TECHNOLOGY (COMPUTER NETWORKS & INFORMATION SECURITY)

I YEAR II SEMESTER NS2P45 CYBER SECURITY

(PROFESSIONAL ELECTIVE – IV) Objectives:

To learn about cyber crimes and how they are planned To learn the vulnerabilities of mobile and wireless devices To learn about the crimes in mobile and wireless devices

Dalam dokumen M.Tech.(CNIS)-2017-2018.pdf (Halaman 73-78)