LESSON PLAN
Course Code & Name : CS9224/Information
Security
Faculty / Designation : Mr. S. P. Santhoshkumar / Assistant
Professor
Class & Semester : I Year M.E (CSE) – II Semester
Sl.
No.
|
PROPOSED
|
TOPIC
|
|
DATE
|
PERIOD |
||
1
|
07.02.12
|
1
|
Unit -1: Introduction
|
2
|
07.02.12
|
4
|
An Overview of Computer Security
|
3
|
08.02.12
|
6
|
The Basic Components – Threats - Policy and Mechanism
|
4
|
09.02.12
|
4
|
Assumptions and Trust – Assurance-Operational
Issues
|
5
|
14.02.12
|
1
|
Human Issues - Tying It All Together -
|
6
|
14.02.12
|
4
|
Access Control Matrix - Protection State - Access Control Matrix Model
|
7
|
15.02.12
|
6
|
Protection State Transitions - Copying, Owning,
and the Attenuation of Privilege
|
8
|
16.02.12
|
4
|
Policy-Security policies - Confidentiality Policies - Goals of
Confidentiality Policies - The Bell-LaPadula Model
|
9
|
17.02.12
|
6
|
Tranquility - The Controversy over the
Bell-LaPadula Model -
|
10
|
21.02.12
|
1
|
Integrity Policies – Goals - Biba Integrity Model -
|
11
|
21.02.12
|
4
|
Lipner's Integrity Matrix Model - Clark-Wilson
Integrity Model
|
12
|
22.02.12
|
6
|
Hybrid Policies - Chinese Wall Model
|
13
|
23.02.12
|
4
|
Clinical Information Systems Security Policy
|
14
|
24.02.12
|
6
|
Originator Controlled Access Control - Role-Based
Access Control
|
15
|
28.02.12
|
1
|
Review - 1
|
16
|
28.02.12
|
4
|
Unit -2: Introduction
|
17
|
29.02.12
|
6
|
Cryptography
|
18
|
01.03.12
|
4
|
Key management
|
19
|
02.03.12
|
6
|
Session and Interchange keys
|
20
|
06.03.12
|
1
|
Key exchange and
generation
|
21
|
06.03.12
|
4
|
Cryptographic Key Infrastructure
|
22
|
07.03.12
|
6
|
Storing and Revoking Keys
|
23
|
08.03.12
|
4
|
Digital
Signatures
|
24
|
09.03.11
|
6
|
Cipher Techniques
|
CYCLE TEST-1 (13.03.2012 TO
15.03.2012)
|
|||
25
|
13.03.12
|
1
|
Review-2
|
26
|
13.03.12
|
4
|
Unit -3: Systems:
|
27
|
14.03.12
|
6
|
Design Principles,
|
28
|
15.03.12
|
4
|
Representing Identity- What Is Identity? -
Files and Objects
|
29
|
16.03.12
|
6
|
Users - Groups and Roles - Naming and Certificates -
Identity on the Web
|
30
|
20.03.12
|
1
|
Access Control Mechanisms - Access Control Lists -
Capabilities
|
31
|
20.03.12
|
4
|
Locks and Keys - Ring-Based Access Control - Propagated
Access Control Lists
|
32
|
21.03.12
|
6
|
Information Flow - Basics and Background -
Nonlattice
Information Flow Policies - Compiler-Based Mechanisms
|
33
|
22.03.12
|
4
|
Execution-Based Mechanisms - Example Information
Flow Controls
|
34
|
27.03.12
|
1
|
Confinement Problem - The Confinement Problem
- Isolation
|
35
|
27.03.12
|
4
|
Covert Channels
|
36
|
28.03.12
|
6
|
Review -3
|
37
|
29.03.12
|
4
|
Unit -4: Malicious Logic – Introduction - Trojan
Horses
|
38
|
30.03.12
|
6
|
Computer Viruses - Computer Worms -
|
39
|
03.04.12
|
1
|
Other Forms of Malicious Logic
-Theory of Malicious Logic - Defenses
|
40
|
03.04.12
|
4
|
Vulnerability Analysis – Introduction - Penetration Studies
|
41
|
04.04.12
|
6
|
Vulnerability Classification - Frameworks
|
42
|
05.04.12
|
4
|
Gupta and Gligor's Theory of
Penetration Analysis
|
43
|
06.04.12
|
6
|
Auditing - Definitions
- Anatomy of an Auditing System
|
44
|
10.04.12
|
1
|
Designing an Auditing System -
A Posteriori Design
|
45
|
10.04.12
|
4
|
Auditing Mechanisms - Examples:
Auditing File Systems
|
CYCLE
TEST-2 (11.04.2012 TO 14.04.2012)
|
|||
46
|
17.04.12
|
1
|
Audit Browsing - Intrusion Detection
|
47
|
17.04.12
|
4
|
Principles - Basic Intrusion
Detection – Models - Architecture
|
48
|
18.04.12
|
6
|
Organization of Intrusion
Detection Systems - Intrusion Response
|
49
|
19.04.12
|
4
|
Review -4
|
50
|
24.04.12
|
1
|
Unit -5: Network
Security – Introduction
- Policy Development
|
51
|
24.04.12
|
4
|
Network Organization - Availability and Network
Flooding - Anticipating Attacks
|
52
|
25.04.12
|
6
|
System Security – Introduction – Policy –Networks - Users
|
53
|
26.04.12
|
4
|
Authentication – Processes –
Files – Retrospective -
|
54
|
27.04.12
|
6
|
User Security – Policy
- Access - Files and Devices
|
55
|
01.05.12
|
1
|
Processes - Electronic Communications
|
56
|
01.05.12
|
4
|
Program Security – Introduction - Requirements and Policy - Design
|
57
|
02.05.12
|
6
|
Refinement and Implementation - Common
Security-Related Programming Problems -
|
58
|
03.05.12
|
4
|
Testing, Maintenance, and Operation – Distribution
-
|
59
|
04.05.12
|
6
|
Review - 5
|
CYCLE TEST-3 (09.05.2012 TO
11.05.2012)
|
Faculty in- charge
|
HoD i/c / CSE
|
PRINCIPAL
|
Mr. S.P.Santhoshkumar
|
Mrs. N. Suba Rani
|
Dr. T. Manigandan
|
No comments:
Post a Comment