MS232 Information Security

Unit 1 [Book]
Introduction to Information Security, Elements of Information Security VIEW
Security System Development Life Cycle VIEW
Security Professionals and Organisations VIEW
Business Need for Security VIEW
Threats and attacks VIEW
IPR Software VIEW
Hardware Threats and Attacks VIEW
QoS attacks VIEW
Professional, Legal, and Ethical issues in Security VIEW
Unit 2 [Book]
Managing IT Risk VIEW
Introduction to Risk Analysis VIEW
Risk Assessment VIEW
IT Risk Analysis Techniques and Methodologies VIEW
Risk Mitigation VIEW
Business Continuity Planning VIEW
Cyber Security, Cyber Crimes, Classification, Tools, and Methods of Cyber Crimes VIEW
Social, Political, Ethical issues in Cyber Security VIEW
Concept of Computer Forensics VIEW
Unit 3 [Book]
Security Technologies: Wireless VIEW
VPNs and Firewalls VIEW
Access Controls VIEW
Prevention Systems, Honeypots, Honeynets VIEW
Intrusion Detection and Prevention (IDPS) VIEW
Digital Signatures and Certificates VIEW VIEW
Encryption VIEW
Decryption VIEW
Cryptanalysis, Ciphering Methods VIEW
Unit 4 [Book]
Information System Auditing, Foundations of Information System Auditing, Objectives, Scope VIEW
Audit Process Management VIEW
Controls and Application Controls VIEW
Information Technology Law IT Act Definition, VIEW
Important terms under IT Legislation, Electronic records, Certifying authority, Jurisdictional Issues VIEW
Cyber Regulation Appellate Tribunal VIEW
Cyber Regulation Offences and Penalties VIEW

Leave a Reply

error: Content is protected !!