ANNA UNIVERSITY CP4351 SECURITY PRACTICES SYLLABUS REGULATION 2021 | ANNA UNIVERSITY M.E REGULATION 2021 SYLLABUS
UNIT I SYSTEM SECURITY
Model of network security – Security attacks, services and mechanisms – OSI security architecture -
A Cryptography primer- Intrusion detection system- Intrusion Prevention system - Security web
applications- Case study: OWASP - Top 10 Web Application Security Risks.
UNIT II NETWORK SECURITY
Internet Security - Intranet security- Local Area Network Security - Wireless Network Security -
Wireless Sensor Network Security- Cellular Network Security - Mobile security - IOT security - Case
Study - Kali Linux.
UNIT III SECURITY MANAGEMENT
Information security essentials for IT Managers- Security Management System - Policy Driven
System Management- IT Security - Online Identity and User Management System. Case study:
Metasploit
UNIT IV CYBER SECURITY AND CLOUD SECURITY
Cyber Forensics- Disk Forensics – Network Forensics – Wireless Forensics – Database Forensics –
Malware Forensics – Mobile Forensics – Email Forensics- Best security practices for automate
Cloud infrastructure management – Establishing trust in IaaS, PaaS, and SaaS Cloud types. Case
study: DVWA
UNIT V PRIVACY AND STORAGE SECURITY
Privacy on the Internet - Privacy Enhancing Technologies - Personal privacy Policies - Detection of
Conflicts in security policies- privacy and security in environment monitoring systems. Storage Area
Network Security - Storage Area Network Security Devices - Risk management - Physical Security
Essentials.
COURSE OUTCOMES:
CO1: Understand the core fundamentals of system security
CO2: Apply the security concepts to wired and wireless networks
CO3: Implement and Manage the security essentials in IT Sector
CO4: Explain the concepts of Cyber Security and Cyber forensics
CO5: Be aware of Privacy and Storage security Issues.
REFERENCES
1. John R. Vacca, Computer and Information Security Handbook, Third Edition, Elsevier 2017
2. Michael E. Whitman, Herbert J. Mattord, Principles of Information Security, Seventh Edition,
Cengage Learning, 2022
3. Richard E. Smith, Elementary Information Security, Third Edition, Jones and Bartlett
Learning, 2019
4. Mayor, K.K.Mookhey, Jacopo Cervini, Fairuzan Roslan, Kevin Beaver, Metasploit Toolkit for
Penetration Testing, Exploit Development and Vulnerability Research, Syngress
publications, Elsevier, 2007. ISBN : 978-1-59749-074-0
5. John Sammons, “The Basics of Digital Forensics- The Primer for Getting Started in Digital
Forensics”, Syngress, 2012
6. Cory Altheide and Harlan Carvey, “Digital Forensics with Open Source Tools”,2011 Syngress, ISBN: 9781597495875.
7. Siani Pearson, George Yee "Privacy and Security for Cloud Computing" Computer
Communications and Networks, Springer, 2013.
Post Your comments,Views and thoughts Here, Give Us Time To Respond Your Queries