0% found this document useful (0 votes)
17 views7 pages

ISIT Syllabus Index

Uploaded by

akkupatel055
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views7 pages

ISIT Syllabus Index

Uploaded by

akkupatel055
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

ISIT Syllabus - Detailed Index

**Index of ISIT Syllabus**

### 1. Introduction and Security Trends (6 Periods)

- Need for security

- Security principles

- Authentication

- Access control

#### 1.2 Threats to Security

- Viruses and Worms

- Intruders, Insiders

- Criminal organizations

- Terrorists

- Information Warfare (IW)

- Avenues of attack

- Steps in attack

#### 1.3 Types of Attack

- Active and Passive attacks

- Denial of service

- Backdoors and trapdoors

- Sniffing, Spoofing

- Man in the Middle

- Replay

- TCP/IP Hacking

Page 1
ISIT Syllabus - Detailed Index

- Encryption attacks

- Malware: Viruses, Logic Bombs

### 2. Organizational/Operational Security (7 Periods)

#### 2.1 Role of People in Security

- Password selection

- Piggybacking

- Shoulder surfing

- Dumpster diving

- Installing unauthorized software/hardware

- Access by non-employees

- Security awareness

- Individual user responsibilities

#### 2.2 Physical Security

- Access controls (Biometrics: Fingerprints, Handprints, Retina, Patterns, Voice Patterns)

- Signature and writing patterns

- Keystrokes and physical barriers

#### 2.3 Network Security Basics

- Model for network security

### 3. Cryptography and Public Key Infrastructure (13 Periods)

#### 3.1 Introduction

- Cryptography

Page 2
ISIT Syllabus - Detailed Index

- Cryptanalysis

- Cryptology

- Substitution techniques:

- Caesar's cipher

- Monoalphabetic and polyalphabetic transposition techniques:

- Rail Fence technique

- Simple Columnar

- Steganography

#### 3.2 Hashing

- Concept

#### 3.3 Symmetric and Asymmetric Cryptography

- Symmetric Encryption: DES (Data Encryption Standard) Algorithm

- Diffie-Hellman Algorithm

- Problem of key distribution

- Asymmetric Key Cryptography

- Digital Signature, Key escrow

#### 3.4 Public Key Encryption

- Basics

- Digital certificates

- Certificate authorities

- Registration authorities

- Steps for obtaining a digital certificate

Page 3
ISIT Syllabus - Detailed Index

- Steps for verifying authenticity and integrity of a certificate

### 4. Network Security (8 Periods)

#### 4.1 Firewalls

- Concept

- Design

- Principles

- Limitations

- Trusted System

- Kerberos Concept

#### 4.2 Security Topologies

- Security Zones

- DMZ

- Internet

- Intranet

- VLAN

- Security Implications

- Tunneling

#### 4.3 IP Security (IPSec)

- Overview

- Architecture

- IPSec Configuration

- IPSec Security

Page 4
ISIT Syllabus - Detailed Index

#### 4.4 Virtual Private Network (VPN)

#### 4.5 Email Security

- Email Security Standards:

- Working principles of SMTP, PEM, PGP, S/MIME, Spam

### 5. System Security (8 Periods)

#### 5.1 Intruders

- Intrusion Detection System (IDS)

- Host-based IDS

- Network-based IDS

#### 5.2 Password Management

- Vulnerability of passwords

- Password selection strategies

- Components of good passwords

#### 5.3 Operating System Security

- Operating System Hardening

- General Steps for Securing Windows Operating System

- Hardening UNIX/Linux-based Operating Systems

- Updates:

- Hot Fix

- Patch

Page 5
ISIT Syllabus - Detailed Index

- Service Pack

### 6. Application and Web Security (6 Periods)

#### 6.1 Application Hardening

- Application Patches

- Web Servers

- Active Directory

#### 6.2 Web Security Threats

- Web Traffic Security Approaches

- Secure Socket Layer and Transport Layer Security

- Secure Electronic Transaction Software Development:

- Secure Code Techniques

- Buffer Overflow

- Code Injection

- Least Privilege

- Good Practices

- Testing

### 7. IT Laws (8 Periods)

#### 7.1 Information Security Standards

- ISO

- IT Act

- Copyright Act

- Patent Law

Page 6
ISIT Syllabus - Detailed Index

- IPR

- Cyber Laws in India

- IT Act 2000 Provisions and Latest Amendments

#### 7.2 Intellectual Property Law

- Copy Right Law

- Software License

- Semiconductor Law

- Patent Law

Page 7

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy