Course Content
1. Introduction to Information Security 2. Information Risk Management & Analysis 3. Security planning, management and policy 4. Role Based Access Control Systems 5. Network Security 6. Digital Security 7. Security Law, Investigation and ethical issues 8. Security Audits and Standards - BS7779 and ISO27000 9. Disaster Recovery & Business Continuity Plan 10. Physical Security 11. Ethical Hacking in Business
Tentative Session Plan
(Chief Architect – Honeywell )
(Director - Oracle Corporation)
(Managing Director - MUSA Software)
Quiz (2) – 40% Case Study Discussions – 10% Term paper – 10% Final Exam – 40%
Case Study
Objectives of Case Analysis:
1. To identify major issues/problem(s) 2. Examine facts and evaluate evidences 3. Apply knowledge / experience / understanding gained in the class to analyze and take necessary actions and consider feasibility of alternative courses of action 4. Steps for implementation
References
1. Principles of Information Security – Michael E Whitman and Herbert J Mattord, Cengage Learning publications 2. Introduction to Cryptography - Principles and applications. Delfs, H. and H. Knebl. Springer-Verlag. 2002 3. Design of robust business-to-business electronic marketplaces with guaranteed privacy: J, Kalvenes, A.Basu, Management Science, Vol. 52, no. 11, pp. 1721-1736 Created By: Bijoy Kar on 12/10/2009 at 12:18 PM Category: ExPGP-NR-III Doctype: Document