Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application



Similar documents
NETWORK ADMINISTRATION AND SECURITY

Business-to-Business Electronic Commerce ( B2B-EC )

Certified Information Systems Auditor (CISA)

Answer Question No. 1 which is compulsory and any five from the rest. a) What are the various components of electronic commerce applications?

Enterprise Systems: From Supply Chains to ERP to CRM

Module 6. e-business and e- Commerce

ก ก ก ก ก (3-0-6) ก ก ก (Introduction to Business) (Principles of Marketing)

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Management Information Systems. B08. Interorganizational and Global Information Systems

Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems

APPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

Evaluate the Usability of Security Audits in Electronic Commerce

Introduction to Information Systems. 2 hrs lecture 2 hrs lab

CORE CONCEPTS OF. Thirteenth Edition. Mark G. Simkin, PhD. Professor Department of Information Systems University of Nevada

Network Security Essentials:

Weighted Total Mark. Weighted Exam Mark

ELECTRONIC COMMERCE WORKED EXAMPLES

Course Description Bachelor in Management Information Systems

CRYPTOG NETWORK SECURITY

Community Development and Training Centre Semester IT 245 Management Information Systems

ACCOUNTING INFORMATION SYSTEMS

Syllabus E-Business and E-commerce

C - COMMERCE CONCEPTS MODELS STRATEGIES C.S.V. MURTHY

Course Syllabus. Course code: Academic Staff Specifics. Office Number and Location

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER APPLICATIONS COURSE PLAN

The Masters of Science in Information Systems & Technology

Internet Part 2. CS/MIS Department

Bellevue University Cybersecurity Programs & Courses

Software Development Training Camp 1 (0-3) Prerequisite : Program development skill enhancement camp, at least 48 person-hours.

Course Syllabus For Operations Management. Management Information Systems

One LAR Course Credits: 3. Page 4

Knowledge Management

ELECTRONIC COMMERCE SYSTEMS

E-Business, E-Commerce

CISA TIMETABLE (4 DAYS)

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS

CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

Information Systems and Electronic Communications in Logistics Management

Master of Science in Information Systems & Security Management. Courses Descriptions

Outline. Introduction to E-commerce. Why is e-commerce? [Awad] What is e-commerce? Session 1. Yan Wang E-commerce.

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MBA (e-commerce) 5 Yrs. Semester VI. Advance Java Programming

ICTTEN8195B Evaluate and apply network security

Network Security Course Specifications

Information Security Course Specifications

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

IT1104- Information Systems & Technology (Compulsory)

Case-study: SwissAir. The Internet Business. Case-study: SwissAir. Case-study: SwissAir. Summary. Summary

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

M.S. Computer Science Program

Introduction to Cyber Security / Information Security

Electronic Commerce. Chapter Overview

MSc Information Technology - E521

BIT Course Description

Bachelor of Science in Business Administration - Information Systems and Technology Major

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.

Secure System Solution and Security Technology

Chapter 8. Network Security

Concepts in Enterprise Resource Planning

Chapter: 1. Enterprise Resource Planning

Supply Chain Management

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Introduction to E-Commerce

Computer Information Systems

Chapter 5. B2B E-Commerce: Selling and Buying in Private E-Markets

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

Information Technology Division

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6)

1. Which segment do ebay, Amazon.com, and LandsEnd.com belong? 2. Which segment focuses on consumers dealing with each other?

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

(Instructor-led; 3 Days)

CISCO IOS NETWORK SECURITY (IINS)

1) A complete SCM solution includes customers, service providers and partners. Answer: TRUE Diff: 2 Page Ref: 304

Module 3 Applications of Information Systems: Enterprise Systems

The Importance of Integrative Components in the Field of e-business and Information Systems

Course Syllabus. Academic Staff Specifics

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems

Chapter 13: Knowledge Management In Nutshell. Information Technology For Management Turban, McLean, Wetherbe John Wiley & Sons, Inc.

We Believe in Security with a Capital S

VALLIAMMAI ENGINEERING COLLEGE

Chapter 1 The Principles of Auditing 1

Chapter 8 - Strengthening Business-to- Business Relationships via Supply Chain and Customer Relationship Management

Department of Information Systems and Cyber Security

CRYPTOGRAPHY AND NETWORK SECURITY

IT6304 e-business Applications (Optional)

Information Systems for Business Operations

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Transcription:

BCA-S307 Computer Network Security 4 0 0 4 Introduction: Attack, Services and Mechanism, Model for Internetwork Security. Cryptography: Notion of Plain Text, Encryption, Key, Cipher Text, Decryption and cryptanalysis; Public Key Encryption, digital Signatures and Authentication. I Network Security: Authentication Application: Kerveros, X.509, Directory Authentication Service, Pretty Good Privacy, S/Mime. IP security Architecture: Overview, Authentication header, Encapsulating Security Pay Load combining Security Associations, Key Management. V Web Security: Requirement, Secure Socket Layer, Transport Layer Security, and Secure Electronic Transactions. UNIT-V Network Management Security: Overview of SNMP Architecutre-SMMPVI1 Communication Facility, SNMPV3. UNIT-VI System Security: Intruders, Viruses and Relate Threats, Firewall Design Principles. Comprehensive examples using available software platforms/case tools, Configuration Management. 1. W. Stallings, Networks Security Essentials: Application & Standards, Pearson Education, 2000. 2. W.Stallings, Cryptography and Network Security, Principles and Practice, Pearson Education, 2000.

BCA-S308 Information System: Analysis Design & Implementation 3 1 0 4 Overview of System Analysis and Design: Systems Development Life Cycle; concept and Models: requirements determination, logical design, physical design, test planning, implementation, planning and performance evaluation, communication, interviewing, presentation skills; group dynamics; risk and feasibility analysis; group based approaches, JAD, structures walkthroughs, and design and code reviews; prototyping; database design software quality metrics; application categories software package evaluation and acquisition. I Information Requirement Analysis: Process modeling with physical logical data flow diagrams, data modeling with logical entity relationship diagrams. Developing a Proposal: Feasibility study and cost estimation. System Design: Design of input and control, design of output and control, file design/database design, process, user interface design, prototyping; software constructors; documentation. V Application Development Methodologies and CASE tools: Information engineering structured system analysis and design, and object oriented methodologies for application development data modeling, process modeling, user interface design, and prototyping, use of computer aided software engineering (CASE) tools in the analysis design and implementation of information systems. UNIT-V Design and Implementation on OO Platform: Object oriented analysis and design through object modeling technique, object modeling, dynamic modeling and functional object oriented design and object oriented programming systems for implementation, object oriented data bases. UNIT-VI Managerial issues in Software Projects: Introduction to software markets; planning of software projects, size and cost estimates; project scheduling; measurement of software quality and productivity, ISO and capability maturity models for organizational growth. 1. I.T.Haryszkiewycz, Introduction of System Analysis and Design, Pearson Education, (PHI) 1998. 2. V.Rajaraman, Analysis and Design of Information System, Pearson Education, 1991. 3. J.A.Senn, Analysis and Design of Information Systems 1. J.K.Whiten., L.D.Bentley, V.M.Beslow, System Analysis and Design Methods, (Galgotia Publications Pvt.Ltd.) 1994

BCA-S309 E-Commerce 4 0 0 4 Introduction to E-Commerce: The Scope of Electronic Commerce, Definition of Electronic Commerce, Electronic E-commerce and the Trade Cycle, Electronic Markets, Electronic Data Interchange, Internet Commerce, E-Commerce in Perspective. Business Strategy in an Electronic Age: Supply Chains, Porter s Value Chain Model, Inter Organizational Value Chains, Competitive Strategy, Porter s Model, First Mover Advantage Sustainable Competitive Advantage, Competitive Advantage using E-Commerce, Business Strategy, Introduction to Business Strategy, Strategic Implications of IT, Technology, Business Environment, Business Capability, Exiting Business Strategy, Strategy Formulation & Implementation Planning, E-Commerce Implementation, E-Commerce Evaluation. I Business-to-Business Electronic Commerce: Characteristics of B2B EC, Models of B2B Ec, Procurement Management Using the Buyer s Internal Marketplace, Just in Time Delivery, Other B2B Models, Auctions and Services from Traditional to Internet Based EDI, Intergration with Back-end Information System, The Role of Software Agents for B2B EC, Electronic marketing in B2B, Solutions of B2B EC, Managerial Issues, Electronic Data Interchange (EDI), EDI: The Nuts and Bolts, EDI & Business. Internet and Extranet : Automotive Network Exchange, The Largest Extranet, Architecture of the Internet, Intranet and Extranet, Intranet software, Applications of Intranets, Intranet Application Case Studies, Considerations in Intranet Deployment, The Extranets, The structures of Extranets, Extranet products & services, Applications of Extranets, Business Models of Extranet Applications, Managerial Issues. Electronic Payment Systems : Is SET a failure, Electronic Payments & Protocols, Security Schemes in Electronic payment systems, Electronic Credit card system on the Internet, Electronic Fund transfer and Debit cards on the Internet, Stored value Cards and E- Cash, Electronic Check Systems, Prospect of Electronic Payment Systems, Managerial Issues. V Public Policy: From Legal Issues to Privacy : EC- Related Legal Incidents, Legal Incidents, Ethical & Other Public Policy Issues, Protecting Privacy, Protecting Intellectual Property, Free speech, Internet Indecency & Censorship, Taxation & Encryption Policies, Other Legal Issues: Contracts, Gambling & More, Consumer & Seller Protection In EC. UNIT-V Infrastructure For EC : It takes more than Technology, A Network Of Networks, Internet Protocols, Web- Based client/ Server, Internet Security, selling on the web, Chatting on the Web, Multimedia delivery, Analyzing Web Visits, Managerial Issues. 1. David Whiteley, E-Commerce, Tata McGraw Hill, 2000 2. Eframi Turban, Jae Lee, David King, K. Michale Chung, Electronic Commerce, Pearson Education, 2000

BCA-S310 Knowledge Management 3 1 0 4 Business Intelligence and Business Decisions: Modeling Decision Process; Decision support systems; Group decision support and Groupware Technologies. I Executive Information and support Systems: Business Expert System and AI, OLTO & OLAP; Data Warehousing; Data Marts, Data Warehouse architecture; Tools for data warehousing. Multi- Dimensional analysis: Data mining and knowledge discovery; Data mining and Techniques; Data mining of Advance Databases. V Knowledge Management Systems: Concept and Structure KM systems, techniques of knowledge management appreciation & limitation. 1. Decision support system, EIS, 2000 2. W.H.Inmon, Building Data Warehousing, Willey, 1998. 3. Han, Jiawei, Kamber, Michelinal, Data Mining Concepts & Techniques, Harcourt India, 2001

BCA-S311 Major Project 0 3 6 5 Evaluation will be based on held after fourth semester and will be Conducted by the college committee only.

BCA-S312 Presentation/Seminar based on Major Project 1 Presentation/Seminar based on Major Project will be evaluated by external examiner only.