You are on page 1of 4

Semester: MBA IV

W.e.f. Academic year 2018-2019 and onwards

SOFTWARE
Subject Name: ENGINEERING AND Total Hours: 54 hours
MANAGEMENT
Subject Code: MBA4025 Teaching Hours: 4 Hrs /Week
Subject Credits: 04
External Marks: 50 Internal Marks: 50

Learning Objectives:

1. To provide fundamental concepts of software engineering and management


2. To provide a concrete basis of software project development and planning
3. To provide an understanding of various software tools used in projects

Learning Outcomes:

On the successful completion of the course, the student would be able to

1. The application of a systematic, disciplined, quantifiable approach to the development,


operation, and maintenance of software.
2. The tools and methods for software requirements, software design, software construction,
software testing, and software maintenance tasks

Pedagogy:

Lectures and Discussions, Assignments and Presentations, Case Analysis.

Module 1: 08 Hours
Introduction: Software, Software Crisis, Software Characteristics, Software Application,
Attributes of good Software, Software Engineering, Need for software Engineering, Software
Engineering Challenges. Principles of Software Engineering.

Module 2: 12 Hours
Software Process Models:
SDLC (Software Development Life Cycle), Waterfall, Spiral Model, Verification &
Validation Model, Prototype Model, Agile Model.

Module 3: 10 Hours
Requirements Engineering
Functional and non-functional requirements. The Software Requirements Document,
Requirements Specification, Requirements Engineering Processes, Requirement Elicitation
and Analysis, Requirements Validation, Requirements Management.

Module 4: 10 Hours
Software Project Estimation and Planning:
Process Planning, Effort Estimation, Project Scheduling and Staffing, Software Configuration
Management Plan, Quality Plan, Risk Management, Project Monitoring Plan.

| ASPCC/MBA/3 & 4 Sem./2018-19 Page 1


Module 5: 14 Hours
Software Testing:
Overview of Software testing, Types of Testing - White Box Testing, Black Box Testing,
Approaches for testing of software deliverables – Unit Testing, Integration testing, System
testing, Performance Testing, Acceptance Testing. Examples of Software testing tools
Software Quality Management:
Software Quality Metrics, Defect Prevention Planning and establishing a Software Quality
Management Plan for the project.

Reference Books:

1) Ugrasen Suman, Software Engineering: Concepts & Practices-, Cengage Learning


publications.
2) K K Aggarwal, Software Engineering by New Age Publication
3) Bob Hughes and Mike Cotterell- Software Project Management : Tata McGraw Hill
4) Roger S Pressman, Software Engineering a Practitioner‟s approach –Tata McGraw Hill
5) Helen Sharp & Mark Woodman, Introduction to Software Project Management &
Quality Assurance.
6) Ian Sommerville, Software Engineering –Addison Wesley, 2004
7) Rajib Mall , Fundamentals of Software Engineering-, PHI, New Delhi.
8) Whitten Neal, Managing Software Development Projects – A formula for Success.
9) Mythical Man Month – Essays on Software Engineering
10) Kieron Conway – Software Project Management – From Concepts to Deployment –
Dreamtech Publications.

| ASPCC/MBA/3 & 4 Sem./2018-19 Page 2


Semester: MBA IV
W.e.f Academic year 2018-2019 and onwards

INFORMATION
Subject Name: SECURITY AND Total Hours: 54 hours
CYBER LAWS
Subject Code: MBA4026 Teaching Hours: 4 Hrs /Week
Subject Credits: 04
External Marks: 50 Internal Marks: 50

Learning Objectives:

1. To explore the challenges in information Security


2. To provide extensive knowledge on standards for Information Security and their
implications
3. To provide technical skills and knowledge about various methods for securing
information

Learning Outcomes:

The course would enable the students to

1. Sensitize about the various information security threats, recognize the ethical issues and
privacy issues involved in information security.
2. Identify and choose appropriate security management tools to handle information
security threats.

Pedagogy:

Lectures and Discussions, Assignments and Presentations, Case Analysis.

Module 1: 12 Hours
Introduction - Introduction to Information Systems, Types of Information Systems,
Development of Information Systems, Introduction to Information Security, Need for
Information Security, Threats to Information Systems, Information Assurance, Cyber Security,
and Security Risk Analysis.

Module 2: 10 Hours
Application Security- (Database, E-mail and Internet), Data Security Considerations-
Backups, Archival Storage and Disposal of Data, Security Technology-Firewall and VPNs,
Intrusion Detection, Access Control. Security Threats -Viruses, Worms, Trojan Horse, Bombs,
Trapdoors, Spoofs, E-mail Viruses, Macro Viruses, Malicious Software, Network and Denial
of Services Attack, Security Threats to E-Commerce- Electronic Payment System, e- Cash,
Credit/Debit Cards. Digital Signature, Public Key Cryptography

Module 3: 10 Hours
Developing Secure Information Systems- Application Development Security, Information
Security Governance & Risk Management, Security Architecture & Design Security Issues in
Hardware, Data Storage & Downloadable Devices, Physical Security of IT Assets, Access
Control, CCTV and Intrusion Detection Systems, Backup Security Measures.

| ASPCC/MBA/3 & 4 Sem./2018-19 Page 3


Module 4: 08 Hours
Security Policies- Development of Policies, WWW Policies, Email Security Policies, Policy
Review Process-Corporate Policies-Sample Security Policies, Publishing and Notification
Requirement of the Policies.

Module 5: 14 Hours
Unit 1 - Cyber crimes
Introduction to Cyber crime, Classifications, Hacking, Phishing, Identity theft, Email spoofing
Cyber stalking, Cyber Defamation, Intellectual Property, Copyright infringement, digital rights
management (DRM), Software Piracy, types of software piracy, Plagiarism, Cybersquatting,
legal and other innovative moves against cyber-squatting. Denial Of Service Attack (DOS),
Salami Attacks, Pornography (basically child pornography).
Unit 2 - Cyber-laws
Cyber Laws in India, Cyber laws against hacking, cyber fraud, defamation and abuse,
pornography and other offences; Salient features of IT Act 2000 & IT Act Amendment-2008,
Intellectual Property Law. Discussion on Indian cyber crime Case Studies.

Case lets on Cyber laws to be discussed in the class.

Reference Books:

1. Charles P. Pfleeger, Shari Lawerance Pfleeger, “Analysing Computer Security”, Pearson


Education India.
2. V.K.Pachghare, “Cryptography and information Security”, PHI Learning Private
Limited, Delhi India.
3. Sarika Gupta & Gaurav Gupta, Information Security and Cyber Laws, Khanna
Publishing House
4. Anshul Kaushik, Cyber Security, Khanna Publishing House
5. Dr.Surya Prakash Tripathi, Ritendra Goyal, Praveen Kumar Shukla,”Introduction to
Information Security and Cyber Law” Willey Dreamtech Press.
6. Michael E.Whitman and Herbert J Mattord "Principle of Information Security" Cengage
7. Mike Chapple and David Seidl "Cyberwarfare: Information operations in a connected
world" Jones & Bartlett Learning
8. Schou, Shoemaker, “Information Assurance for the Enterprise”, Tata McGraw Hill.
9. CHANDER, HARISH,” Cyber Laws And It Protection ” , PHI Learning Private Limited
,Delhi
10. V.K. Jain, Cryptography and Network Security, Khanna Publishing House, Delhi
11. Mark Merkow and James Breithaupt, Information Security: Principles and Practices,
Pearson Education, New Delhi.
12. Vivek Sood, Cyber Law Simplified, Tata McGraw Hill, New Delhi Reference Books
13. Matt Bishop, Introduction to Computer Security, 1/e, Pearson Education, New Delhi.
14. Godbole, Nina (2011). Information System Security – Security Management, Metrics,
Frameworks and Best Practices; New Delhi: Wiley India
15. Rhodes-Ousley, Mark (2013). Information Security: The Complete Reference, 2/e; New
Delhi: McGraw-Hill

| ASPCC/MBA/3 & 4 Sem./2018-19 Page 4

You might also like