Professional Documents
Culture Documents
SOFTWARE
Subject Name: ENGINEERING AND Total Hours: 54 hours
MANAGEMENT
Subject Code: MBA4025 Teaching Hours: 4 Hrs /Week
Subject Credits: 04
External Marks: 50 Internal Marks: 50
Learning Objectives:
Learning Outcomes:
Pedagogy:
Module 1: 08 Hours
Introduction: Software, Software Crisis, Software Characteristics, Software Application,
Attributes of good Software, Software Engineering, Need for software Engineering, Software
Engineering Challenges. Principles of Software Engineering.
Module 2: 12 Hours
Software Process Models:
SDLC (Software Development Life Cycle), Waterfall, Spiral Model, Verification &
Validation Model, Prototype Model, Agile Model.
Module 3: 10 Hours
Requirements Engineering
Functional and non-functional requirements. The Software Requirements Document,
Requirements Specification, Requirements Engineering Processes, Requirement Elicitation
and Analysis, Requirements Validation, Requirements Management.
Module 4: 10 Hours
Software Project Estimation and Planning:
Process Planning, Effort Estimation, Project Scheduling and Staffing, Software Configuration
Management Plan, Quality Plan, Risk Management, Project Monitoring Plan.
Reference Books:
INFORMATION
Subject Name: SECURITY AND Total Hours: 54 hours
CYBER LAWS
Subject Code: MBA4026 Teaching Hours: 4 Hrs /Week
Subject Credits: 04
External Marks: 50 Internal Marks: 50
Learning Objectives:
Learning Outcomes:
1. Sensitize about the various information security threats, recognize the ethical issues and
privacy issues involved in information security.
2. Identify and choose appropriate security management tools to handle information
security threats.
Pedagogy:
Module 1: 12 Hours
Introduction - Introduction to Information Systems, Types of Information Systems,
Development of Information Systems, Introduction to Information Security, Need for
Information Security, Threats to Information Systems, Information Assurance, Cyber Security,
and Security Risk Analysis.
Module 2: 10 Hours
Application Security- (Database, E-mail and Internet), Data Security Considerations-
Backups, Archival Storage and Disposal of Data, Security Technology-Firewall and VPNs,
Intrusion Detection, Access Control. Security Threats -Viruses, Worms, Trojan Horse, Bombs,
Trapdoors, Spoofs, E-mail Viruses, Macro Viruses, Malicious Software, Network and Denial
of Services Attack, Security Threats to E-Commerce- Electronic Payment System, e- Cash,
Credit/Debit Cards. Digital Signature, Public Key Cryptography
Module 3: 10 Hours
Developing Secure Information Systems- Application Development Security, Information
Security Governance & Risk Management, Security Architecture & Design Security Issues in
Hardware, Data Storage & Downloadable Devices, Physical Security of IT Assets, Access
Control, CCTV and Intrusion Detection Systems, Backup Security Measures.
Module 5: 14 Hours
Unit 1 - Cyber crimes
Introduction to Cyber crime, Classifications, Hacking, Phishing, Identity theft, Email spoofing
Cyber stalking, Cyber Defamation, Intellectual Property, Copyright infringement, digital rights
management (DRM), Software Piracy, types of software piracy, Plagiarism, Cybersquatting,
legal and other innovative moves against cyber-squatting. Denial Of Service Attack (DOS),
Salami Attacks, Pornography (basically child pornography).
Unit 2 - Cyber-laws
Cyber Laws in India, Cyber laws against hacking, cyber fraud, defamation and abuse,
pornography and other offences; Salient features of IT Act 2000 & IT Act Amendment-2008,
Intellectual Property Law. Discussion on Indian cyber crime Case Studies.
Reference Books: