WELCOME TO TECHNICAL PUBLICATIONS
You have no items in your shopping cart.
Close
Filters
Search

DECODE-Cyber Security

Vandana Gupta ISBN-9789333206228
10% Discount
₹ 95.00
₹ 86.00
+ -

UNIT - 1
Introduction to information systems, Types of information systems, Development of information systems, Introduction to information security, Need for information security, Threats to information systems, Information assurance, Cyber security and security risk analysis.
UNIT - 2
Application security (database, e-mail and internet), Data security considerations - Backups, Archival storage and disposal of data, Security technology - Firewall and VPNs, Intrusion detection, Access control.
Security threats - Viruses, Worms, Trojan horse, Bombs, Trapdoors, Spoofs, E-mail viruses, Macro viruses, Malicious software, Network and denial of services attack, Security threats to e-Commerce - Electronic payment system, e-Cash, Credit / Debit cards. Digital signature, Public key cryptography.
UNIT - 3
Developing secure information systems, Application development security, Information security governance and risk management, Security architecture and design.
Security issues in hardware, Data storage and downloadable devices, Physical security of IT assets, Access control, CCTV and intrusion detection systems, Backup security measures.
UNIT - 4
Security policies, Why policies should be developed, WWW policies, Email security policies, Policy review process - Corporate policies - Sample security policies, Publishing and notification requirement of the policies.
Information security standards-ISO, IT act, Copyright act, Patent law, IPR. Cyber laws in India; IT act 2000 provisions, Intellectual property law : Copyright law, Software license, Semiconductor law and patent law.

 

UNIT - 1
Introduction to information systems, Types of information systems, Development of information systems, Introduction to information security, Need for information security, Threats to information systems, Information assurance, Cyber security and security risk analysis.
UNIT - 2
Application security (database, e-mail and internet), Data security considerations - Backups, Archival storage and disposal of data, Security technology - Firewall and VPNs, Intrusion detection, Access control.
Security threats - Viruses, Worms, Trojan horse, Bombs, Trapdoors, Spoofs, E-mail viruses, Macro viruses, Malicious software, Network and denial of services attack, Security threats to e-Commerce - Electronic payment system, e-Cash, Credit / Debit cards. Digital signature, Public key cryptography.
UNIT - 3
Developing secure information systems, Application development security, Information security governance and risk management, Security architecture and design.
Security issues in hardware, Data storage and downloadable devices, Physical security of IT assets, Access control, CCTV and intrusion detection systems, Backup security measures.
UNIT - 4
Security policies, Why policies should be developed, WWW policies, Email security policies, Policy review process - Corporate policies - Sample security policies, Publishing and notification requirement of the policies.
Information security standards-ISO, IT act, Copyright act, Patent law, IPR. Cyber laws in India; IT act 2000 provisions, Intellectual property law : Copyright law, Software license, Semiconductor law and patent law.

 

Write your own review
  • Only registered users can write reviews
  • Bad
  • Excellent
Customers who bought this item also bought

DECODE- Managerial Economics

V. S. Bagad ISBN-9789333220194
10% Discount
₹ 68.00 ₹ 75.00

DECODE -Database Management System

Prof. Seema V. Kedar ISBN-9789333206488
10% Discount
₹ 126.00 ₹ 140.00

DECODE-Design & Analysis of Algorithms

DECODE ISBN-9789333206389
10% Discount
₹ 126.00 ₹ 140.00

DECODE-Principles of Programming Languages

A. A. Puntambekar ISBN-9789333219488
10% Discount
₹ 99.00 ₹ 110.00