Professional Documents
Culture Documents
JECRC University Jaipur Theory Plan
JECRC University Jaipur Theory Plan
Class Subject : M.Tech. : Mobile Computing Theory : 100 marks Lectures: 3 Hrs/week
Lec ture No 1 2 3 4 5 6
Plan Date
Actua l Date
Overview of Mobile Computing: Its applications, Radio Communication Mobile Computing Architecture Mobile System Networks Data Dissemination, Mobility Management
7 8 9 10 11 12
13
14
15
16 17 18 19 20 21 22 23 24 25
H.O.D.: Sign:
AIM
The protection of the interests of those relying on information, and the information systems and Communications that deliver the information, from harm resulting from failures of availability, confidentiality, and integrity. The security objective uses three terms Availability:- information systems are available and usable when required; Confidentiality:- data and information are disclosed only to those who have a right to know it. Integrity:-The content should not be changed. By the end of this course, students will learn about: 1)Understand the importance of information systems security. 2)Understand the importance of protecting the privacy and confidentiality of data. 3)Know and understand the security- and privacy-related Federal government-wide and organization-specific laws, regulations, policies, guidelines, and standards, and how to apply them. 4)Know and understand your role and responsibilities within the AIS Security Program. 5)Be able to assist in the risk management program within your components, by identifying computer security threats and vulnerabilities, and assisting in the identification of appropriate safeguards. 6)Be able to identify management, technical, personnel, operational, and physical controls. Know the security requirements for protecting workstations and the information processed on them. 7)Be able to identify and implement preventative measures for computer viruses, identify the signs of a possible infection, identify a virus hoax, and implement virus recovery techniques. 8)Have developed an understanding of general physical and environmental security requirements.