Preview

Information Security and Management Syllabus

Satisfactory Essays
Open Document
Open Document
5382 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security and Management Syllabus
SCHEME OF EXAMINATION

&

SYLLABI

for

Master of Technology
(Information Security & Management)

[pic]

Uttrakhand Technical University, Dehradun www.uktech.in Study And Evaluation Scheme - M.Tech.

Information Security and Management

Academic Session: 2010-2011

Year 1, SEMESTER-i

|S.No |Course Code |Subject |Periods |Evaluation Scheme |Subject |
| | | | | |Total |
| | | | |Sessional Exam. |Exam | |
| |L |T |P |CT |TA |
| | | | |Sessional Exam. |Exam | |
| |L |T |P |CT |TA |
| | | | |Sessional Exam. |Exam | |
| |L |T |P |CT |TA |
| | | | |Sessional Exam. |Exam | |

|L |T |P |CT |TA |Total |ESE | | |5. |ISMP-401 |Dissertation |0 |0 |30 |- | |200 |200 |400 | | | |Total | | |30 | | | | |400 | |

ELECTIVE COURSES Elective-I

ISM-185 Mobile



References: 1. Paul Raj Poonia, “Fundamentals of Data Warehousing”, John Wiley & Sons, 2003. 2. Sam Anahony, “Data Warehousing in the real world: A practical guide for building decision support systems”, John Wiley, 2004 3 4. Kamber and Han, “Data Mining Concepts and Techniques”, Hart court India P. Ltd., 2001 ISM 291 TRUST MANAGEMENT IN E-COMMERCE L T/P C 3. Siani Pearson, et al, “Trusted Computing Platforms: TCPA Technology in Context”, Prentice Hall PTR, 2002.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Meltdown at Jetblue

    • 394 Words
    • 2 Pages

    References: Rainer, R. K., Jr., & Turban, E. (2009). Introduction to information systems: Supporting and transforming business (2nd ed.). Hoboken, NJ: Wiley.…

    • 394 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cis 850 Study Guid

    • 499 Words
    • 2 Pages

    * Explain both data warehousing and data mining. How are they related? List at least three uses of data mining.…

    • 499 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 Proposal

    • 315 Words
    • 2 Pages

    Rainer, R. K. & Cegielski, C. G. (2011). Introduction to information systems: Supporting and transforming business (3rd ed.). Hoboken, NJ: John Wiley &…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    2511 M W15 MD 01 02 14

    • 3673 Words
    • 16 Pages

    Rainer, Cegielski, Splettstoesser-Hogeterp and Sánchez-Rodríguez. 2013. Introduction to Information Systems: Supporting and Transforming Business, Third Canadian Edition, John Wiley & Sons, Inc.…

    • 3673 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Better Essays

    References: Rainer, R.K., Jr., & Turban, E. (2009). Introduction to information systems: Supporting and transforming business (3rd ed.). Hoboken, NJ: John Wiley & Sons, Inc.…

    • 1654 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Sundiata

    • 1012 Words
    • 5 Pages

    If you want a taste of West African History Sundiata will give you exactly what you want and more. Sundiata was an interesting piece of literature to read. Unlike the previous two books we have read this semester I found this book much more simple. This book was much easier for me to comprehend and actually get into. This book exposed me not only to the West African history, but also a new religion.…

    • 1012 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Oedipus Rex Essay

    • 534 Words
    • 3 Pages

    King Laios of Thebes was given a prophecy from the oracle that he would be murdered by his son’s hand, and that his son would marry his wife, Queen Iocaste. When Oedipus was born, King Laios had him taken to Mt. Cithaeron to die, however, the servant who was instructed to take him to the mountain felt pity for the baby and turned him over to a shepherd from Corinth. Once in Corinth, he was raised by King Polybus and Queen Merope, and the prophecy slowly became a reality.…

    • 534 Words
    • 3 Pages
    Good Essays
  • Good Essays

    4. Each of the following is a successive layer in which information security is achieved except _______.…

    • 3457 Words
    • 14 Pages
    Good Essays
  • Powerful Essays

    Acct1101 Exam Final Sample

    • 1426 Words
    • 6 Pages

    This sample exam is intended to be an indication of the content of the main and final exams.…

    • 1426 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    References: Rainer, R.K. & Cegielski, C. G (2011). Introduction to information systems: Supporting and transforming business (3rd Ed.). Hoboken, NJ: John Wiley & Sons.…

    • 480 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Motor Skills

    • 1283 Words
    • 6 Pages

    All children go through different stages of development. An infant or very young child will play alone happily. If another child wanders onto the scene, he/she may be physically attacked or pushed out of the way. They are very important to keep the world going on. Next, the child can play with another child, gradually learning to share and take turns. Eventually, the group grows larger, to three or four children.…

    • 1283 Words
    • 6 Pages
    Powerful Essays