CP4391 Security Practices Syllabus:

CP4391 Security Practices Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 To learn the core fundamentals of system and web security concepts
 To have through understanding in the security concepts related to networks
 To deploy the security essentials in IT Sector
 To be exposed to the concepts of Cyber Security and cloud security
 To perform a detailed study of Privacy and Storage security and related Issues

UNIT I SYSTEM SECURITY

Model of network security – Security attacks, services and mechanisms – OSI security architecture -A Cryptography primer- Intrusion detection system- Intrusion Prevention system – Security web applications- Case study: OWASP – Top 10 Web Application Security Risks.

UNIT II NETWORK SECURITY

Internet Security – Intranet security- Local Area Network Security – Wireless Network Security – Wireless Sensor Network Security- Cellular Network Security – Mobile security – IOT security – Case Study – Kali Linux.

UNIT III SECURITY MANAGEMENT

Information security essentials for IT Managers- Security Management System – Policy Driven System Management- IT Security – Online Identity and User Management System. Case study: Metasploit

UNIT IV CYBER SECURITY AND CLOUD SECURITY

Cyber Forensics- Disk Forensics – Network Forensics – Wireless Forensics – Database Forensics – Malware Forensics – Mobile Forensics – Email Forensics- Best security practices for automate Cloud infrastructure management – Establishing trust in IaaS, PaaS, and SaaS Cloud types. Case study: DVWA

UNIT V PRIVACY AND STORAGE SECURITY

Privacy on the Internet – Privacy Enhancing Technologies – Personal privacy Policies – Detection of Conflicts in security policies- privacy and security in environment monitoring systems. Storage Area Network Security – Storage Area Network Security Devices – Risk management – Physical Security Essentials.

COURSE OUTCOMES:

CO1: Understand the core fundamentals of system security
CO2: Apply the security concepts to wired and wireless networks
CO3: Implement and Manage the security essentials in IT Sector
CO4: Explain the concepts of Cyber Security and Cyber forensics
CO5: Be aware of Privacy and Storage security Issues.

REFERENCES

1. John R. Vacca, Computer and Information Security Handbook, Third Edition, Elsevier 2017
2. Michael E. Whitman, Herbert J. Mattord, Principles of Information Security, Seventh Edition, Cengage Learning, 2022
3. Richard E. Smith, Elementary Information Security, Third Edition, Jones and Bartlett Learning, 2019
4. Mayor, K.K.Mookhey, Jacopo Cervini, Fairuzan Roslan, Kevin Beaver, Metasploit Toolkit for Penetration Testing, Exploit Development and Vulnerability Research, Syngress publications, Elsevier, 2007. ISBN : 978-1-59749-074-0
5. John Sammons, “The Basics of Digital Forensics- The Primer for Getting Started in Digital Forensics”, Syngress, 2012
6. Cory Altheide and Harlan Carvey, “Digital Forensics with Open Source Tools”,2011 Syngress, ISBN: 9781597495875.
7. Siani Pearson, George Yee “Privacy and Security for Cloud Computing” Computer Communications and Networks, Springer, 2013.