Computer Security Lecture Plan MCA-505: Unit Topic Hours Required
The document outlines a lecture plan for a computer security course divided into 4 units covering 10 hours. Unit 1 introduces computer security concepts over 10 lectures. Unit 2 covers program security threats and controls over 12 lectures. Unit 3 addresses database security requirements and network security threats over 10 lectures. Finally, Unit 4 discusses administering security through planning, policies, and legal/ethical issues over 10 lectures.
Computer Security Lecture Plan MCA-505: Unit Topic Hours Required
The document outlines a lecture plan for a computer security course divided into 4 units covering 10 hours. Unit 1 introduces computer security concepts over 10 lectures. Unit 2 covers program security threats and controls over 12 lectures. Unit 3 addresses database security requirements and network security threats over 10 lectures. Finally, Unit 4 discusses administering security through planning, policies, and legal/ethical issues over 10 lectures.
Unit-1 Introduction S.No. Topic No. of lectures 1. The Security Problem in Computing: The meaning of 2 Computer Security, Computer Criminals, Methods of Defense,
2. Elementary Cryptography: Symmetric and Non-symmetric 3
keys Substitution Ciphers,
3. Transpositions, Making "Good" Encryption Algorithms, The 3
Data Encryption Standard, 4. The AES Encryption. Algorithm, Public Key Encryptions, 2 Uses of Encryption.
Unit-2 Program Security
S.No. Topic No. of lectures 1. Secure Programs, Non-malicious Program Errors, viruses and 2 other malicious code 2. Targeted Malicious code, controls Against Program Threats 2
3. Protection in General-Purpose operating system protected 2
objects and methods of protection 4. File protection Mechanisms, User Authentication Designing 2 Trusted O.S : Security polices 5. models of security, trusted O.S. design, Assurance in trusted 4 OS, Implementation examples. Unit-3 Database Security S.No. Topic No. of lectures 1. Security requirements, Reliability and integrity, Sensitive data 2
2. Inference, multilevel database, proposals for multilevel 2
2. Physical Security, Legal Privacy and Ethical Issues in 2
Computer Security. Protecting Programs and data, Information and the law, Rights of Employees and Employers, 3. Software failure, Computer Crime, Praia 3
4. Ethical issues in Computer Security, Case studies of Ethics 3