1. Essentials of Information Security, Security Threats – Intruders, Viruses, Worms, and other
Threats, Vulnerabilities, Cyber Crime and Hacker, Security Assessment, Analysis and
Assurance, Role of Cryptography, The Data encryption Standard (DES), Analyzing and
Strengthening of DES, Introduction to Advance Encryption Standard (AES)
2. Concept and Characteristics of Public Key Encryption system, Introduction to MerkleHellman
Knapsacks, Rivets – Shamir-Adlman (RSA) Encryption. Hash Algorithms, Message
Digest Algorithms such as MD4 and MD5, Secure Hash Algorithms such as SH1 and
SHA2.Digital Signature Standard.
3. Network Security Issues such as Impersonation, Message Confidentiality, Message Integrity,
Code Integrity, Denial of Service, Firewalls, DMZs, Virtual Private Networks. Web Security,
Email Security, Pretty Good Privacy
4. Risk Management and Security planning –Risk management Process Overview and Life
Cycle Activities, Information Security Life Cycle, Risk Analysis, Cost Benefit Analysis, Risk
Assessment Process, Methodology, Threat assessment, Modes of risk analysis – Effective Risk
analysis, Risk Mitigation, Qualitative Risk Analysis, Value Analysis, Case Study of IT Organization