M.Tech, Syllabus

JNTUH M.Tech 2017-2018 (R17) Detailed Syllabus Privacy and Security in Cyber Space

Privacy and Security in Cyber Space Detailed Syllabus for Cyber Forensics & Information Security / Cyber Security M.Tech first year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.

The detailed syllabus for Privacy and Security in Cyber Space M.Tech 2017-2018 (R17) first year second sem is as follows.

M.Tech. I Year II Sem.

Course Objectives:

  • To understand the computer security fundamentals
  • To understand the integrity policies
  • To understand system, user, program security issues

UNIT – I : An Overview of Computer Security: The Basic Components, Threats, Policy and Mechanism, Assumptions and Trust, Assurance, Operational Issues, Human Issues. Security Policies: Security Policies, Types of Security Policies, The Role of Trust, Types of Access Control, Example: Academic Computer Security Policy, General University Policy, Electronic Mail Policy, Confidentiality Policies: Goals of Confidentiality Policies, The Bell-LaPadula Model, Informal Description, Example: The Data General B2 UNIX System.

UNIT – II : Integrity Policies: Goals, Biba Integrity Model, Clark-Wilson Integrity Model, The Model, Comparison with the Requirements, Comparison with Other Models, Hybrid Policies: Chinese Wall Model, BellLa Padula  and Chinese Wall Models, Clark-Wilson and Chinese Wall Models, Clinical Information Systems Security Policy, Bell-LaPadula and Clark-Wilson Models, Originator Controlled Access Control, Role-Based Access Control.

UNIT – III : Design Principles: Overview, Design Principles, Principle of Least Privilege, Principle of Fail-Safe Defaults, Principle of Economy of Mechanism, Principle of Complete Mediation, Principle of Open Design, Principle of Separation of Privilege, Principle of Least Common Mechanism, Principle of Psychological Acceptability.

UNIT – III : System Security: Introduction, Policy: The Web Server System in the DMZ, The Development System, Networks: The Web Server System in the DMZ, The Development System, Users: The Web Server System in the DMZ, The Development System, Authentication: The Web Server System in the DMZ, Development Network System.

UNIT – IV : User Security: Policy, Access: Passwords, The Login Procedure, Trusted Hosts, Leaving the System, Files and Devices: Files, File Permissions on Creation, Group Access, File Deletion, Devices Writable Devices, Smart Terminals, Monitors and Window Systems, Processes: Copying and Moving Files, Accidentally Overwriting Files, Encryption, Cryptographic Keys, and Passwords, Start-up Settings, Limiting Privileges, Malicious Logic.

UNIT – V: Program Security: Introduction, Common Security-Related Programming Problems, Improper Choice of Initial Protection Domain, Improper Isolation of Implementation Detail, Improper Change, Improper Naming, Improper Deallocation or Deletion, Improper Validation, Improper Indivisibility, Improper Sequencing, Improper Choice of Operand or Operation, Testing, Maintenance, and Operation.

TEXT BOOK:

  • “Introduction to Computer Security”, Matt Bishop, Sathyanarayana S. Venkatramanayya, Pearson Education.

REFERENCES:

  • “Computer Security”, Dieter Gollmann, Wiley India.

For all other M.Tech 1st Year 2nd Sem syllabus go to JNTUH M.Tech Cyber Forensics & Information Security / Cyber Security 1st Year 2nd Sem Course Structure for (R17) Batch.

All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.

Do share with friends and in case of questions please feel free drop a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.