SVCET/6F/COURSE FILE/Rev:01/Dt:28.12.
2015/01a
SRI VIDYA COLLEGE OF ENGINEERING & TECHNOLOGY
COURSE PLAN (THEORY)
ACADEMIC YEAR:2025-2026
Subject Code CW3551 L T P C
Subject Title DATA AND INFORMATION SECURITY 3 0 0 3
Year / Dept / Sem III/AIDS & CSBS/05 Regulation Year 2021
Faculty Name / Desg / R.VIDHYALAKSHMI, AP / AI &DS
Dept
Course Prerequisite
Syllabus
UNIT I INTRODUCTION 9
History, What is Information Security?- Critical Characteristics of Information -NSTISSC Security Model- Components of
an Information System- Securing the Components- Balancing Security and Access,-The SDLC-The Security SDLC.
UNIT II SECURITY INVESTIGATION 9
Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues - An Overview of Computer
Security - Access Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid policies.
UNIT IIIDIGITAL SIGNATURE AND AUNTHENTICATION 9
Digital Signature and Authentication Schemes: Digital signature-Digital Signature Schemes and their Variants- Digital
Signature Standards-Authentication: Overview- Requirements Protocols - Applications - Kerberos -X.509 Directory
Services.
UNIT IV E-MAIL AND IP SECURITY 9
E-mail and IP Security: Electronic mail security: Email Architecture -PGP – Operational Descriptions Key management-
Trust Model- S/MIME.IP Security: Overview- Architecture - ESP, AH Protocols IPSec Modes – Security association - Key
management.
UNIT V WEBSECURITY 9
Web Security: Requirements- Secure Sockets Layer- Objectives-Layers -SSL secure communication-Protocols - Transport
Level Security. Secure Electronic Transaction- Entities DS Verification-SET processing. TOTAL :45 PERIODS
TOTAL:45 PERIODS
TEXT BOOKS
1.TEXT BOOKS: 1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security, Course Technology,
6th Edition, 2017.
2. Stallings William. Cryptography and Network Security: Principles and Practice, Seventh Edition, Pearson Education,
2017.
Reference Books
R1. Harold F. Tipton, Micki Krause Nozaki,, “Information Security Management Handbook, Volume 6, 6th Edition,
2016.
R2. Stuart McClure, Joel Scrambray, George Kurtz, “Hacking Exposed”, McGraw- Hill, Seventh Edition, 2012.
R3. Matt Bishop, “Computer Security Art and Science, Addison Wesley Reprint Edition, 2015.
R4. Behrouz A Forouzan, Debdeep Mukhopadhyay, Cryptography And network security, 3rd Edition, . McGraw-Hill
Education, 2015.
• To understand the basics of Information Security
Course Objectives (CO) • To know the legal, ethical and professional issues in Information Security
• To equip the students’ knowledge on digital signature, email security and web security
Page 1 of 4
SVCET/6F/COURSE FILE/Rev:01/Dt:28.12.2015/01a
At the end of the course, the students should be able to:
COURSE OUTCOMES:
At the end of this course, the students will be able to:
ECO1:Understand the basics of data and information security
Expected Course ECO2:Understand the legal, ethical and professional issues in information security
Outcomes (ECO) ECO3:Understand the various authentication schemes to simulate different applications.
ECO4:Understand various security practices and system security standards.
ECO5:Understand the Web security protocols for E-Commerce applications
Mapping of CO & PO(Specify the PO’s) - (Fill the col.s with the legend given below)
CO PO1 PO2 PO3 PO PO5 PO PO7 PO PO PO1 PO11 PO1 PS
4 6 8 9 0 2 O1
3 2 3 1 - - - - 1 3 1 2 2
1 3 3 3 2 - - - 1 2 2 2 2
2 3 3 3 1 - - - 1 3 1 2 2
3 3 1 1 1 - - - 3 1 1 3 3
3 2 2 3 2 - - - 1 2 1 2 2
1. Risk management
Bridging the
Curriculum Gap 2. Cryptography
(Additional Topics
3. Physical security
beyond
syllabus/Seminars/Assig 4. Security and personnel.
nments)
www.studocu.com
www.enggtree.com
www.braincart.
https://www.studocu.com/in/document/panimalar-institute-of-technology/cryptography-
Related Website URLs and-
https://www.youtube.com/watch?v=cJoigxTjTUYetwork-security/cw3551-data-and-
information-security/74092045com
Page 2 of 4
SVCET/6F/COURSE FILE/Rev:01/Dt:28.12.2015/01a
Teaching Cumulative
S.No Topic Name Book – P. No No of hrs
Aids hrs
UNIT I
1. History, What is Information T2-03
BB
Security? 1 1
2. Critical Characteristics of T2-08
BB
Information, 1 2
3. NSTISSC Security T2-15 4
BB 2
Model
4. Components of an Information System, T2-16 2 6
Securing the BB
Components
5. Balancing Security T2-19 7
BB 1
and Access
6. The SDLC, The T2-20,26 9
BB 2
Security SDLC
UNIT II
7. Need for Security, Business Needs,
Threats, Attacks, Legal, Ethical and T2-41 BB 3 12
Professional Issues
8. An Overview of Computer Security
Access Control EL1 BB 2 14
Matrix
9. Security policies, Confidentiality
BB 2 16
policies EL1
10. Integrity policies
BB 2 18
and Hybrid policies EL1
UNIT III
11. Digital Signature and Authentication
Schemes: Digital T1-416 BB 1 19
signature
12. Digital Signature Schemes and their T1 (418 -430)
Variants- Digital Signature BB 2 21
Standards
13. Authentication: Overview-
Requirements T1 - 378 BB 2 23
Protocols
14. Applications - T1-510
BB 2 25
Kerberos
15. X.509 Directory
T1485 BB 2 27
Services
UNIT IV
16. E-mail and IP
BB 2 29
Security: Electronic mail security T1-597
17. Email Architecture - PGP – Operational
Descriptions- Key T1-473 LCD 2 31
management
18. Trust Model- S/MIME.
33
IP Security: T1-609 BB 2
Overview- Architecture
19.
ESP,AH Protocols LCD 1 34
T1-640
20. IPSec Modes – Security association T1- 656,659
LCD 2 36
- Key management.
UNIT V
21. Web Security: Requirements- EL1 BB 2 38
Secure Sockets
Page 3 of 4
SVCET/6F/COURSE FILE/Rev:01/Dt:28.12.2015/01a
Layer
22. Objectives-Layers - SSL secure EL1
communication- LCD 3 41
Protocols
23. Transport Level EL1
Security. Secure Electronic BB 2 43
Transaction
24. Entities DS EL1
BB 2 45
Verification-SET processing.
Prepared by Verified by Approved by
Signature
Name R.Vidhyalakshmi Mrs.S.Ellammal Dr.T.Louie Frango
Designation Assistant Professor Associate Professor / HOD (AI &DS) PRINCIPAL
Signed date 31.07.2025 31.07.2025
Page 4 of 4