Teacherguide CSE ISE
Teacherguide CSE ISE
Teacherguide CSE ISE
E.g The Secureness of precious materials being stolen like gold, money,
Mark sheet of student etc.)
*Note- Conclude the lecture with Block keywords & definitions and suitable
diagram
2
Examples of Application where security is important
Eg: Bank where locker facility is provided
Models of security
3
Define Risk
Computer Security by Dieter Gollman Chapter 1, Page No 13
5
What is Threat- Definition
What is different categories of Threats
Definition of Virus and Worms Differentiate between them
Principles of Computer Security: Comp TIA Security+ and Beyond by Wm.
Arthur Conklin Chapter 1 Page no 7
Cryptography and Network Security by AtulKahate Chapter 1 Page no 16, 18
Different types of Viruses Life Cycle of Viruses (Draw
Diagram)
Cryptography and Network Security by AtulKahate Chapter 1 Page no 16 to 18
Define Intruders & Insiders Differentiate between them (Give
real life example or any movie example)
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 1 Page no 7,8
Web Sites
http://www.f-secure.com/en/web/labs_global/threat-types
http://support.kaspersky.com/viruses/general/614
http://peterhgregory.wordpress.com/2009/03/14/security-basics-definitions-
of-threat-attack-and-vulnerability/
6
Who is Criminal Organization what is their
purpose(any movie example)
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 1 Page no 9
Who is Terrorists what is their aim/goals(any movie example)
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 1 Page no 9
Information Warfare
Why there is need of Information Warfare
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 1 Page no 9
Avenues of Attacks (Example of any Criminal Activity)
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 1 Page no 11
Steps in Attack How attack can happen in any organization
like Bank robbery
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 1 Page no 12
7
What is Attack Definition of attack
Active and Passive Attack Differentiate between them,
Classification of passive and active attacks
Cryptography and Network Security by Atul Kahate Chapter 1 Page no 12 to 15
Denial of Service Attack (DOS & DDOS)
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 15 Page no 400
Web Site - http://www.slideshare.net/chintanjpatel/unit-1-33882940
8 Backdoor, Trapdoors
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 15 Page no 403
Sniffing
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 15 Page no 404
Spoofing
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 15 Page no 405, 406
Encryption Attack
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 15 Page no 410
Web Site
https://www.parkbank.com/about/security/computer-security
http://vickyvikramaditya1.blogspot.in/2011/08/sniffing-and-spoofing.html
PPT
https://www.google.co.in/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=4&cad=rja&uact=8&sqi=2&ved
=0CD8QFjAD&url=http%3A%2F%2Fwww.pcs.cnu.edu%2F~dgame
%2Fcs446Gen%2Ftopics%2FSniffing
%2FSniffing.PPT&ei=5WKhU7a2E4OiugTag4CACQ&usg=AFQjCNE2f2
hwh4vf1vWecSJh8I8D47Wy0g&bvm=bv.69137298,d.c2E
9 Man-in-middle attack
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 15 Page no 408
Replay Attack
TCP/IP Hacking
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 15 Page no 409
Web Site
http://careerride.com/Networking-replay-attacks.aspx
PPT
https://www.google.co.in/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=14&cad=rja&uact=8&ved=0CF
0QFjAN&url=http%3A%2F%2Fcsc.columbusstate.edu%2Fsummers
%2Fnotes%2Fcs557%2F3mf%2FReplay-
Attacks.ppt&ei=S2OhU9T8GdGdugTCyoLQBw&usg=AFQjCNG0tQwkX
Uxg0-6LnH-_ZzDNqSHlzw&bvm=bv.69137298,d.c2E
10 Definition of Malware
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 15 Page no 415
Various categories of Malwares
What is Virus and Logic Bombs
Principles of Computer Security:Comp TIA Security+ and Beyond by Wm. Arthur
Conklin Chapter 15 Page no 418
Web site
http://www.malwaretruth.com/the-list-of-malware-types/
http://www.kaspersky.co.in/internet-security-center/threats/malware-
classifications
Topic 2 Name: Authentication and Operational Security Objectives
Learning Resources:
Books:
*Note- Conclude the lecture with Block keywords & definitions and suitable
diagram
Piggybacking
Principles of Computer Security Security + and Beyond by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.No-73
Shoulder Surfing
Principles of Computer Security Security + and Beyond by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.No-70
Dumpster Diving
Principles of Computer Security Security + and Beyond by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.No-74
Access By Non-employee
Principles of Computer Security Security + and Beyond by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.No-75
Security Awareness
Principles of Computer Security Security + and Beyond by Wm. Arthur Conklin
Dwayne Chapter 4 Pg.No-76
http://www.slideshare.net/Clarice_Wilson/atm-frauds-and-solutions
9 Introduction to Biometrics
Types of Biometrics
Computer Security Principles & Practices " by William Stalling, Lawrie Brown
Chapter-3 " pg.nos.92 to 97
PPT:
http://www.slideshare.net/vidita123/biometrics-final-ppt
Topic 3 Name: Cryptography
(message:welcometo
third year diploma)
Alphabet A Codified by
Key key 3 to Alphabet
C
Show example of
Cipher Text codified message like
ABC is code to
CDE
Show example of
Encryption encoding plaintext to
Cipher text:
Eg.Computer to
retupmoc
Show example of
Decryption decoding Cipher text to
Plaintext
Eg.retupmoc to
Computer
1 Introduction to Cryptography
Computer Security by Dieter Gollman Chapter 11, Page No 186
Principles of Computer Security + and Beyond by Wm. Arthur
chapter -5 ,Page No- 83
Website-
http://en.wikipedia.org/wiki/Cryptography
http://www.apprendre-en-ligne.net/crypto/bibliotheque/PDF/Kwang.pdf
http://cs.stanford.edu/people/eroberts/cs181/projects/dvd- css/cryptography.htm
PPT
http://www.sce.uhcl.edu/yang/teaching/csci5931netSecuritySpr05/nsech
02a.ppt
2 What is Substitution Technique?
Cryptography and Network Security by AtulKahate Chapter 2, Page No 41
Website-
http://www.cimt.plymouth.ac.uk/resources/codes/codes_u1_text.pdf
PPTs-
sce.uhcl.edu/yang/public/Modules/.../Substitution%20Ciphers.ppt
Website-
http://www.cs.man.ac.uk/~banach/COMP61411.Info/CourseSlides/Wk1.2.Classical
.pdf
PPTs -www.eecis.udel.edu/~mills/teaching/eleg867b/crypto_slides/ch02.ppt
4 Define Encryption? Show a block diagram of encryption
Cryptography and Network Security by AtulKahate Chapter 2, Page No 59
Website:
http://www4.ncsu.edu/~kksivara/sfwr4c03/lectures/lecture9.pdf
PPTs - cs.ecust.edu.cn/~yhq/course_files/security/topic2.ppt
5 Name the algorithm uses for Symmetric key cryptography
Website:
http://cs.ucsb.edu/~koc/cs178/docx/w04x-des.pdf
PPTs - islab.csie.ncku.edu.tw/course/slide/ch_06.ppt
6 Details of each step in DES Algorithm along with block diagram
c)Variation of DES
Cryptography and Network Security by AtulKahate Chapter 3, Page No -111
Website-
http://cs.ucsb.edu/~koc/cs178/docx/w04x-des.pdf
https://www.google.co.in/search?q=des
%20algorithm&tbm=isch&ei=LGWmU8m1MtaD8gWpnYKwAQ#facrc=_
&imgdii=_&imgrc=GRgKBo8qM0iufM%253A%3BXIxHOqkYyDZ7mM
%3Bhttp%253A%252F%252Fi1.ytimg.com%252Fvi%252FiayDUAGu9Ec
%252Fhqdefault.jpg%3Bhttp%253A%252F%252Fwww.youtube.com
%252Fwatch%253Fv%253DiayDUAGu9Ec%3B480%3B360
PPTs -islab.csie.ncku.edu.tw/course/slide/ch_06.ppt
7 i. What is Asymmetric key cryptography?
Cryptography and Network Security by AtulKahate Chapter 4,Page No-154-156
Website-
http://www.icg.isy.liu.se/courses/tsit03/forelasningar/cryptolecture08.pdf
http://technet.microsoft.com/en-us/library/cc962021.aspx
PPTs -http://www.slideshare.net/rohitbhatta/introduction-to-digital-signatures
8 Basis of Digital signature
Message digest
Web Site
http://www.cs.iit.edu/~cs549/lectures/CNS-5.pdf
http://www.cs.uiuc.edu/class/fa07/cs498mmp/slides/TFC-F07-Lect15.pdf
https://www.entrust.com/wp-content/uploads/2013/05/cryptointro.pdf
http://technet.microsoft.com/en-us/library/cc962033.aspx
Topic 4 Name: Computer Security Technology and Intrusion Detection
appropriate exampleEg-
Standard Protocols File transfer FTP
1 Introduction to Firewall
Computer Security by Dieter Gollman Chapter 13, Page No 247
Cryptography and Network Security by AtulKahateChapter 13 ,Page No:435-436
Definition of Firewall
Computer Security by Dieter Gollman Chapter 13, Page No 247
Need for Firewall in Computer security and network
Cryptography and Network Security by AtulKahateChapter 13 ,Page No:436
Website-
http://www.dis.uniroma1.it/~alberto/didattica/cns-slides/firewalls.pdf
http://www.cs.iit.edu/~cs549/slides/chapter-14.pdf
PPT -
www.cs.kau.se/cs/education/courses/dvgc03/p4/Firewalls.ppt
2 Working of packet filtering in firewall
Website:
http://www.interpole.net/interpole/products/firewall/interwall/details
3 i. Introduction to VPN
VPN Architecture
Types of VPN
Website-
http://ptgmedia.pearsoncmg.com/images/1587051796/samplechapter/1587051796c
ontent.pdf
PPT-
www.csun.edu/~vcact00f/311/termProjects/.../VPNpresentation.ppt
4 Introduction to Kerberos
Website:
http://cs.brown.edu/cgc/net.secbook/se01/handouts/Ch09-Kerberos.pdf
http://www.cs.kent.edu/~farrell/grid06/lectures/KERBEROS.pdf
http://technet.microsoft.com/en-us/library/cc780469(v=ws.10).aspx
https://www.google.co.in/search?
q=kerberos+authentication&espv=2&source=lnms&tbm=isch&sa=X&ei=BOimU
6HJCNCQuASPr4C4BQ&ved=0CAYQ_AUoAQ&biw=1024&bih=634#facrc=_&
imgdii=_&imgrc=IuJfsiiiaao9WM%253A%3BRh0gI3z74Tb68M%3Bhttp%253A
%252F%252Fwww.zeroshell.org%252Fkerberos%252Fimage%252Fkrbmsg.gif
%3Bhttp%253A%252F%252Fwww.zeroshell.org%252Fkerberos%252FKerberos-
operation%252F%3B638%3B532
6 State different types of Security topology
Working of VLAN
Website-
https://www.google.co.in/search?
q=Security+zone&espv=2&source=lnms&tbm=isch&sa=X&ei=oeimU6vMMdeeu
gTzloJA&ved=0CAYQ_AUoAQ&biw=1024&bih=634#facrc=_&imgdii=_&imgr
c=mJa95BMkxqnx_M%253A%3BI06ak8wt-CiM2M%3Bhttp%253A%252F
%252Fi.msdn.microsoft.com%252Fdynimg%252FIC11169.gif%3Bhttp%253A
%252F%252Fmsdn.microsoft.com%252Fen-us%252Flibrary%252Fcc507438(v
%253Dvs.85).aspx%3B451%3B399
http://www.cse.wustl.edu/~jain/cis788-97/ftp/virtual_lans/
PPT-www.cc.gatech.edu/classes/AY2014/cs4270.../4270-vlan-tutorial.ppt
7 What Intruders? state its three types
Types of IDS
Honey pots
Websites-
http://www.ee.tamu.edu/~reddy/ee689_04/pres_sumitha_james.pdf
PPT -www.cs.utexas.edu/users/ygz/395T-01F/reading/arun.ppt
8 What is Host based IDS ?Show its Components
PPT - www.cs.northwestern.edu/~ychen/classes/msit458-f11/ids.ppt
9 Why Email security standard is required ?
Cryptography and Network Security by AtulKahate chapter 6 Page No- 307-308
What is PEM?
Cryptography and Network Security by AtulKahate chapter 6 Page No- 310-311
Website:
http://www.hydtechwriter.com/what-is-simple-mail-transfer-protocol-smtp/
PPT- www.cs.huji.ac.il/~sans/students_lectures/PEM.ppt
10 Describe PGP
Cryptography and Network Security by AtulKahate chapter 6 Internet Security
Protocol Page No- 314-315
Website:
http://securityweekly.com/presentations/IPSEC.pdf
http://technet.microsoft.com/en-us/library/cc776369(v=ws.10).aspx
https://sc1.checkpoint.com/documents/R76/CP_R76_VPN_AdminGuide/13847.ht
m
http://www.isaserver.org/articles-tutorials/articles/IPSec_Passthrough.html
12 What is Security Association
Principles of Computer CompTIA Security +and beyond by WM.Arthur Conklin
Website:
http://www.isaserver.org/articles-tutorials/articles/IPSec_Passthrough.html
http://www.deepsh.it/networking/IPSec.html
https://techlib.barracuda.com/display/bngv52/how+to+create+an+ipsec+vpn+tunne
l+between+the+barracuda+ng+firewall+and+a+pfsense+firewall
http://flylib.com/books/en/3.190.1.135/1/
https://training.apnic.net/docs/eSEC03_IPSec_Basics.pdf
PPT-www.cs.northwestern.edu/~ychen/classes/mitp-458/ipsec.pp
Topic 5 Name: IT Act and Cyber Law
3 Working of SSL,TLS
i. "Cryptography & Security" by C.K.ShyamalaN.HariniDr T R Padmanabhan
Chapter-11 Pg. nos358 to391
ii. AtulKahate Cryptography & Network Security Chapter-6. Pg.nos-218 to
231
PPT-
www.smsvaranasi.com/KMC/kmc_ppt/islc/SET.ppt
4 Working of SET
i. "Cryptography & Security" by C.K.ShyamalaN.HariniDr T R
Padmanabhan Chapter-11 Pg. nos391 to 415
Teaching Aids:
Black board, Chalk, Transparencies, Power point presentation slides(PPTs),
Reference books, notes, LCD projector/OHP Projector
PPT -
iii. https://www.cs.duke.edu/courses/summer04/cps001/.../Lecture15.ppt
3 How information is classified?
Which criteria is required for classification of Information List various criteria
Principles of Information Security By Nina Godbole
Chapter -5 Page No 76 to 80
4 What is the need of security
Why information security is important?
Principles of Information Security By Nina Godbole
Chapter -1 Page No 2,3
5 Basic principles of information security Show Pyramidal Model of CIA
Confidentiality- Authorized user should able to access information
Integrity- Authorized user should able to modify information
Availability- whether authorized users or host should be available
8 Event classification
Principles of Information Security By Nina Godbole
Chapter -5 Page No 83 to8 5
PPT -
iv. www.oic-ci.gc.ca/eng/DownloadHandler.ashx?...security.ppt
Topic 2 Name: Information Security Architecture and Model
User appropriate
Guidelines
examples like
Guidelines of writing
paper, experiments etc.
User appropriate
Trust
examples like belief in
relationship
PRINCIPLE Confidentiality Model User appropriate PPTs &
Integrity Model examples
PROCEDURE Evaluation Criteria User appropriate PPTs &
TCSEC examples Department of
Defense (India/U.S.)
Learning Resources::
Books:
Information System Security by Godbole Nina Publisher - John Wiley
Information Security Principles and Practices by Mark Merkow & Jim
Breithaupt Publisher Pearson
Teaching Aids:
Black board, Chalk, Transparencies, Power point presentation slides(PPTs),
Reference books, notes, LCD projector/OHP Projector
Lecture Topic/ Subtopic to be covered
No.
Web Site
http://www.cse.psu.edu/~tjaeger/cse443-s12/docs/ch12.pdf
http://www.boran.com/security/tcsec.html
10
What is Information Technology Security Evaluation Criteria (ITSEC)
Information Security Principles and Practices by Mark Merkow & Jim
Breithaupt Chapter No 5, Page No -129
Comparison of ITSEC & TCSEC
Information Security Principles and Practices by Mark Merkow & Jim
Breithaupt Chapter No 5, Page No -130
ITSEC Purposes & Assurance Classes E0 to E6
o Prepare chart for description of E0 to E6
Web Site
http://www.iwar.org.uk/comsec/resources/standards/itsec.htm
http://www.newstaff.com/criteria/itsec/levels/index.html
http://www.cse.dcu.ie/essiscope/sm2/beyond/itsec.html
11
What is Confidentiality & Integrity Model Different Models
Information Security Principles and Practices by Mark Merkow & Jim
Breithaupt Chapter No 5, Page No -141, 142
Bell-LaPadula Model
Biba Integrity Model
Information Security Principles and Practices by Mark Merkow & Jim Breithaupt
Chapter No 5
Web Sites
http://www.digitalthreat.net/2010/05/information-security-models-for-
confidentiality-and-integrity/
PPTs -
https://www.google.co.in/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=8&cad=rja&uact=8&ved=0CEU
QFjAH&url=http%3A%2F%2Fwww.cs.gsu.edu%2F~cscyqz%2Fcourses
%2Faos%2Fslides09%2Fch8.3-Fall09-
XiaoChen.ppt&ei=01ylU80n1J66BM6TgLgD&usg=AFQjCNF75f57UF6r4d
CxBVAEZVSPZEJHzw&bvm=bv.69411363,d.c2E
https://www.google.co.in/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=10&cad=rja&uact=8&ved=0CFE
QFjAJ&url=http%3A%2F%2Fwww.etcs.ipfw.edu%2F~steffen%2FITT
%2FOld-PP%2FChapter%25205-Network%2520Security-
ITT.ppt&ei=01ylU80n1J66BM6TgLgD&usg=AFQjCNFsMY6g2X8tr2dPvo
mZbaIldMrVvg&bvm=bv.69411363,d.c2E
12 Advanced Models- Definition and Use
Information Security Principles and Practices by Mark Merkow & Jim
Breithaupt Chapter No 5, Page No -142
vi. Clark &Wilson Model
vii. Noninterference Model
viii. State Machine Model
ix. Access Matrix Model
x. Information Flow Model
Web Sites
http://www.commondork.com/2010/05/16/bell-la-padula-biba-and-
clark-wilson-security-models/
http://crypto.stanford.edu/~ninghui/courses/Fall03/papers/landwehr_s
urvey.pdf
Topic 3 Name: Cryptography
Show example of
codified message like
MOUSE is code to
UEMOS
1
Introduction to Data Encryption Technique
Cryptography and Information Security by V.K.Pachghare , Chapter-2, Page No
11
What is Cryptanalysis?
Cryptography and Information Security by V.K.Pachghare , Chapter-2, Page No
14-15
Application of Cryptography
Cryptography and Information Security by V.K.Pachghare , Chapter-2, Page No
14-15
Website -
http://en.wikipedia.org/wiki/Cryptography
http://www.apprendre-en-ligne.net/crypto/bibliotheque/PDF/Kwang.pdf
http://cs.stanford.edu/people/eroberts/cs181/projects/dvd- css/cryptography.htm
2
Classical Encryption Technique used by Sender and Recipient
Cryptography and Information Security by V.K.Pachghare , Chapter-2, Page No 11
Website:
http://www.apprendre-en-ligne.net/crypto/bibliotheque/PDF/Kwang.pdf
PPT
1. https://www.cs.purdue.edu/homes/ninghui/.../526_Fall12_topic02.ppt
3
iv. Define Substitution Cipher
Website
http://www.math.uic.edu/CryptoClubProject/CCpacket.pdf
PPT
https://www.cs.usfca.edu/~brooks/S03classes/cs486/lectures/lecture-3.ppt
4
1. Working principal of Playfair cipher Show example
Cryptography and Information Security by V.K.Pachghare , Chapter-2, Page No 17-19
Website-
http://www.ling.ohio-state.edu/~cbrew/2008/spring/playfair.pdf
PPT-
https://www.uop.edu.jo/material/1843212812010.ppt
5
a) Define Transposition cipher. State its 2 types
Cryptography and Information Security by V.K.Pachghare , Chapter-2, Page No 26-27
Website -
http://courses.cs.tamu.edu/pooch/665_spring2008/Australian-sec-2006/less05.html
6 a)Working principle of One Time Pad Give example & Solve it
Cryptography and Information Security by V.K.Pachghare , Chapter-2, Page No 24
PPT-
https://www.cs.usfca.edu/~brooks/S03classes/cs486/lectures/lecture-3.ppt
7 b) What is Stegnography? Flow diagram
Cryptography and Information Security by V.K.Pachghare , Chapter-2, Page No 28
Uses of Stegnography
Cryptography and Information Security by V.K.Pachghare , Chapter-2, Page No 28
Website-
http://arxiv.org/ftp/arxiv/papers/0912/0912.2319.pdf
8 Introduction to Digital Signatures,
Website-
a) http://www.cs.haifa.ac.il/~orrd/IntroToCrypto/online/fips_186-3.pdf
Website-
http://www.cs.haifa.ac.il/~orrd/IntroToCrypto/online/fips_186-3.pdf
http://courses.cs.tamu.edu/pooch/665_spring2008/Australian-sec-2006/less19.html
12 Give Application Digital Signature Standards
Website-
http://www.cs.haifa.ac.il/~orrd/IntroToCrypto/online/fips_186-3.pdf
Topic 4 Name: Data Recovery and Cyber Security
Website -
a) http://pcsupport.about.com/od/filerecovery/tp/free-file-recovery-
programs.htm
b) http://transparen.com/data-protection-group/data-recovery-ethics
3 What is Cyber Crime
Information Security and Cyber Laws by Saurabh Sharma Chapter 8 Page
no 181
Different Types of Cyber Crime
o Use tree diagram for Types of Cyber Crime
Information Security and Cyber Laws by Saurabh Sharma Chapter 8 Page
no 182
PPTs
http://www.slideshare.net/aemankhan/cybercrimeppt-27376284
https://www.google.co.in/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=7&cad=rja&uact=8&sqi=2&ved=
0CEIQFjAG&url=http%3A%2F%2Fwww.cyberseminar.cdit.org%2Fpdf
%2F09_02_09%2Floknath.ppt&ei=kceiU_a-
J9OHuATko4BA&usg=AFQjCNGmpx90JfvtJWuJde2U7XfLaVF7Zg&bvm
=bv.69411363,d.c2E
4 What is Hacking & Cracking Types of Hackers
Virus & its attacks List types of attacks like Dos, DDos
Define terms Pornography, Software Piracy
o Use example like CD Piracy etc.
Information Security and Cyber Laws by Saurabh Sharma Chapter 7 Page
no 174
Website
a) http://www.legalservicesindia.com/articles/cyhac.htm
b) http://evestigate.com/cyber-crime-hacker-terms-to-know/
5 What is Intellectual Property
Copyright,
Patents
Industrial Design Rights
Trademark Use example like logo of MSBTE etc.
What is Industrial Property
Information Security and Cyber Laws by Saurabh Sharma Chapter 7 Page
no 166
Define term Mail Bombs, Bug Exploits
Website
a) http://www.wipo.int/export/sites/www/freepublications/en/intproperty/450/
wipo_pub_450.pdf
PPTs
http://www.slideshare.net/mahmoodttc/intellectual-property-ppt-final
6 Which are different types of legal Systems & its laws
Cyber Crime Investigation its procedure
Website -
http://www.slideshare.net/tabrezahmad/cybercrime-investigation
http://www.scribd.com/doc/94789254/Ppt-on-Investigation-Method-of-
Cyber-Crime
7 Need of Cyber Law
Cyber Crimes and related Laws by Saurabh Sharma Chapter 8 Page no
184 & 187
What is Cyber Laws Definition of Cyber Law
Cyber Crimes and related Laws by Saurabh Sharma Chapter 8 Page no
184
PPTs-
http://www.slideshare.net/Arnab_Roy_Chowdhury/cyber-law-15036761
8
IT Act 2000- Objectives, Scope, Provisions, Advantages &
disadvantages
Information Security and Cyber Laws by Saurabh Sharma Chapter 8 Page no 185
o List out the Chapters
IT Act 2008 Modification in IT Act 2000, Characteristics
o List out the Chapters
PPT
http://www.slideshare.net/YogendraWagh/it-act-ppt-1111
http://www.powershow.com/view1/268863-
ZDc1Z/Information_Technology_Act_2000_v_s_2008_powerpoint_ppt_pres
entation
Topic 5 Name: Access, Physical Control and Compliance Standards
Structure of Computer
Framework System
Use example of
Software frameworks
include support
programs, compilers,
Lecture Topic/ Subtopic to be covered
No.
What is Authentication?
Information Security Principles and Practices by Mark Merkov & Jim
Breithaupt Chapter 10 Page No 234
Website
http://www.cyberciti.biz/faq/authentication-vs-authorization/
http://www.cse.iitk.ac.in/users/biometrics/pages/what_is_biom_more.h
http://www.biometrics.gov/
PPT
www.cse.fau.edu/~security/public/BiometricsPresentation.ppt
https://www.owasp.org/.../OWASPSanAntonio_2006_08_SingleSignO
n.
2
Describe Kerberos Model?
o Use various servers used in Kerberos
o Draw diagram
Information Security Principles and Practices by Mark Merkov & Jim
Breithaupt Chapter 10 Page No 243
Show relation of Kerberos with Authentication
Ex: Student is allowed to enter in Library hall by checking College ID and entering
name in Register and Verify by Librarian or any other suitable examples
Website:
a) http://technet.microsoft.com/en-us/library/cc780469(v=ws.10).aspx
b) http://www.google.co.in/imgres?imgurl=&imgrefurl=http%3A%2F
%2Fwww.codeproject.com%2FArticles%2F27554%2FAuthentication-in-web-
services-using-C-and-
Kerbero&h=0&w=0&tbnid=qv2CJmNFmv7QYM&zoom=1&tbnh=186&tbnw=270
&docid=IGaJwLDTXe1FmM&tbm=isch&ei=G-
eoU_3TCZKgugS8r4LwCQ&ved=0CAIQsCUoAA
c) https://software.intel.com/sites/manageability/AMT_Implementation_and_Referenc
e_Guide/default.htm?turl=WordDocuments
%2Fintroductiontokerberosauthentication.htm
PPT:
a) www.obscure.org/~jafitz/250_p1/Kerberos.ppt
b) www.isi.edu/~annc/classes/grid/lectures/sivaLecture.ppt
3
What is Physical access control?
Ex: Use example of Door Security system or Digital Locker Thumb impression is
used to open lock etc
Principles of Information Security by By Michael E. Whitman , Herbert J.
Mattord Chapter 9 Page no 400
Website
http://www.cdn.com/securitysystemPhysical.aspx
4 b) What is Physical Security example like wall, security dogs, safety doors etc.
Information System Security by Nina Godbole Chapter 7 Page No 102
c) How to provide physical security
Information Security Principles and Practices by Mark Merkov & Jim
Breithaupt Chapter 8 Page No 197, 198
Website
http://www.cdn.com/securitysystemPhysical.aspx
Website:
www.oxforddictionaries.com/definition/english/compliance
http://www.immusec.com/en/implementation-information-security-
management-system
https://www.aiche.org/ccps/topics/elements-process-safety/commitment-
process-safety/compliance-standards/introduction
6
ISO 27001-
Information System Security by Nina Godbole Chapter 22 Page No
400
ISO 20000
Information System Security by Nina Godbole Chapter26 Page No
470
BS25999
PCI DSS
Information System Security by Nina Godbole
Website-
www.iso.org/iso/home/standards/management-standards/iso27001.htm
www.iso27001security.com
http://www.standards.org/standards/listing/iso_20000
https://www.pcisecuritystandards.org/security_standards/
http://www.security-
assessment.com/files/presentations/PCI_DSS_Presentation_0107.pdf
https://www.set.or.th/.../BCM%20with%20PWC%2027%20April%20v3.
PPT-
www.ermantaskin.com/bcm/BS25999_ERMAN_TASKIN.ppt
Website-
http://www.itil-officialsite.com/AboutITIL/WhatisITIL.aspx
http://www.best-management-practice.com/gempdf/itil_the_basics.pdf
PPT -
a) https://www.ok.gov/OSF/documents/ITILOverview.ppt
b) www.chakarov.com/powerpoints/itilv3overview.ppt