You are on page 1of 2

MBA 661 INFORMATION SECURITY & CYBER LAW

MODULE I FOUNDATIONS OF CRYPTOGRAPHY AND SECURITY


Ciphers and Secret Messages, Security Attacks and Services, Mathematical Tools for Cryptography: Substitutions and Permutations, Modular Arithmetic, Euclids Algorithm, Finite fields, Polynomial Arithmetic, Discrete Logarithms .Conventional Symmetric Encryption algorithms: theory of Blocks Cipher Design, Feistel Cipher Network structure, DES and Triple DES.

MODULE II PUBLIC KEY CRYPTOGRAPHY


Prime Numbers and testing for Primality, Factoring, Large Numbers, RSA, DiffleHellman , EIGamal, Key, Exchange Algorithms, Public-key Cryptography Standards , Hashes and Messages Digests Authentication, MID5, SHA , RIPEMD, HMAC.

MODULE III DIGITAL SIGNATURES


Certificates, User Authentication: Digital Signature Standard ( DSS and DSA) Security Handshake Pitfalls, Elliptical Curve Cryptosystems, Authentication of Systems :Kerberos V4, and V5,Electronic mail Security: Pretty Good privacy(PGP)

MODULE IV SECURITY PLANNING


Risk Analysis, Organisational Security Policies, physical Security, Legal Privacy and Ethical issues in Computer Security :Protecting Programs and data Information and the law , Rights of Employees and Employers, Software failures, Computer crime, Praia issues in Computer Security , Case studies of Ethics. Reference Books 1. Forouzan, Cryptography Security And Network Security, TMH 2. Kahate, Cryptography Security And Network Security, TMH 3. Charies P. Pfleeger, Shari Lawrence Pfleeger, PHI. 4. Cryptography & Network Security: William Stalling. 5. Whitman, Principles of Information Security, Cengage/Thomson

MBA 662 SYSTEM ANALYSIS AND DESIGN


MODULE I INTRODUCTION TO SAD
Overview of system analysis and design business systems concepts, system development life cycle, project selection: source of project requests, managing project review and selection , preliminary investigation.

MODULE II FEASIBILITY STUDY


Feasibility study: different types of feasibility, investigative study, cost, benefit analysis, fact findings.

MODULE III SPECIFICATIONS & ANALYSIS


System requirement specifications and analysis: data flow diagrams, data dictionaries, hipo, decision tables, decision trees, Warnier diagram and Nassi- Shneidermen charts, system controls and audit trail, system administration and training , conversion and operational plan.

MODULE IV ORGANIZATIONAL ISSUES


Organizational issues: attributes of a good analysis, the system analysis and law, communicating with computers: ergonomics, human problems in the automated office, designing human machine systems. Reference Books 1. Awad, Elias M. Systems Analysis and Design, Prentice Hall of India, New Delhi. 2. Sharma A.K. Analysis, Design & Implementation of Information System, Vikas Publishing House, New Delhi 3. Satzinger, System Analysis and Design, Thomson Learning, Bombay. 4. Coad, Peter and Edward, Yourdon. Object-Oriented Analysis. 2nd ed., Englewood Cliff, New Jersey, Yourdon Press. 5. Hawryszkiewyez, I T. Introduction to Systems Analysis and Design. 2nd ed., New Delhi, Prentice Hall Of India. 6. Marco, T.d. Structured Analysis & System Specification, New Delhi. Yourdon Press. 7. Rajaraman, V.Analysis and Design of Information Systems. New Delhi, Prentice Hall of India. 8. Van Over, David. Foundations of Business Systems. Fort Worth, Dryden Press. 9. Whitten, J L. System Analysis and Design Methods. New Delhi, Galgotia

You might also like