FULLY SOLVED BOOK LASY 5 YEARS PAPERS SOLVED PLUS GUESS
SECURITY, CONTROL AND AUDIT
SYLLABUS
UNIT I
Introduction to Information Security: Definition - Secrecy and Confidentiality - Accuracy,
Integrity and Authenticity - Security Threats - Vulnerabilities, Threats and
Countermeasures - Firewall - Planning and Administration -Log analysis basic - Logging
states - When to look at the logs - Security information Management.
UNIT II
Ethical Hacking of Computer network, system and application - Malicious Code, Mobile
Code & Denial Of Service attack - Information Security Assessment Process - Network
Stalking and Fingerprinting - Cracking the Shadow and Administrator - Privilege Escalation
- Wireless Security and Review - RFID Hacking and Security Review - Spyware and
Phishing.
UNIT III
Security Policy and Awareness - Security policy guidelines - Security awareness - People,
Process and Technology - Physical Threats to the Information System - Information
Infrastructure - Operating system fundamentals and security.
UNIT IV
Access Control Systems and Methodology: Access Control Overview - Identification
and Authentication Techniques - Access Control Techniques - Access Control
Methodologies and Implementation - Access Control Administration - Access Control
Working Process
Attacks and Monitoring: Monitoring - Intrusion Detection - Penetration Testing - Methods
of Attacks - Access Control Compensations - Security Testing Working Process.
UNIT V
Auditing and Monitoring: Auditing - Monitoring - Monitoring Tools and Techniques -
Penetration Testing Techniques - Inappropriate Activities - Indistinct Threats and
Countermeasures - IT Act - THE CYBER REGULATIONS APPELLATE.