M.Tech, Syllabus

JNTUH M.Tech 2017-2018 (R17) Detailed Syllabus Cyber laws and Security Policies

Cyber laws and Security Policies Detailed Syllabus for Cyber Forensics & Information Security / Cyber Security M.Tech first year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.

The detailed syllabus for Cyber laws and Security Policies M.Tech 2017-2018 (R17) first year second sem is as follows.

M.Tech. I Year II Sem.

Course Objectives:

  • To understand the computer security issues
  • To make secure system planning, policies

UNIT- I : Introduction to Computer Security: Definition, Threats to security, Government requirements, Information Protection and Access Controls, Computer security efforts, Standards, Computer Security mandates and legislation, Privacy considerations, International security activity.

UNIT-II : Secure System Planning and administration, Introduction to the orange book, Security policy requirements, accountability, assurance and documentation requirements, Network Security, The Red book and Government network evaluations.

UNIT-III : Information security policies and procedures: Corporate policies- Tier 1, Tier 2 and Tier3 policies – process management-planning and preparation-developing policies-asset classification policy developing standards.

UNIT- IV : Information security: fundamentals-Employee responsibilities- information classification Information handling- Tools of information security- Information processing-secure program administration.

UNIT-V : Organizational and Human Security: Adoption of Information Security Management Standards, Human Factors in Security- Role of information security professionals.

TEXT BOOK:

  • Debby Russell and Sr. G. T Gangemi, “Computer Security Basics (Paperback)”, 2nd Edition, O’ Reilly Media, 2006.

REFERENCES:

  • Thomas R. Peltier, “Information Security policies and procedures: A Practitioner’s Reference”, 2nd Edition Prentice Hall, 2004.
  • Kenneth J. Knapp, “Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions”, IGI Global, 2009.
  • Thomas R Peltier, Justin Peltier and John blackley, ”Information Security Fundamentals”, 2nd Edition, Prentice Hall, 1996
  • Jonathan Rosenoer, “Cyber law: the Law of the Internet”, Springer-verlag, 1997
  • James Graham, “Cyber Security Essentials” Averbach Publication T & F Group

For all other M.Tech 1st Year 2nd Sem syllabus go to JNTUH M.Tech Cyber Forensics & Information Security / Cyber Security 1st Year 2nd Sem Course Structure for (R17) Batch.

All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.

Do share with friends and in case of questions please feel free drop a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.