This document outlines the modules covered in two courses: MBA 661 Information Security & Cyber Law and MBA 662 System Analysis and Design. MBA 661 covers foundations of cryptography including ciphers, attacks, mathematical tools and conventional encryption algorithms. It also covers public key cryptography, digital signatures, and security planning. MBA 662 covers an introduction to system analysis and design, feasibility studies, system specifications and analysis, and organizational issues. Both courses reference textbooks on related topics.
This document outlines the modules covered in two courses: MBA 661 Information Security & Cyber Law and MBA 662 System Analysis and Design. MBA 661 covers foundations of cryptography including ciphers, attacks, mathematical tools and conventional encryption algorithms. It also covers public key cryptography, digital signatures, and security planning. MBA 662 covers an introduction to system analysis and design, feasibility studies, system specifications and analysis, and organizational issues. Both courses reference textbooks on related topics.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
This document outlines the modules covered in two courses: MBA 661 Information Security & Cyber Law and MBA 662 System Analysis and Design. MBA 661 covers foundations of cryptography including ciphers, attacks, mathematical tools and conventional encryption algorithms. It also covers public key cryptography, digital signatures, and security planning. MBA 662 covers an introduction to system analysis and design, feasibility studies, system specifications and analysis, and organizational issues. Both courses reference textbooks on related topics.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
Ciphers and Secret Messages, Security Attacks and Services, Mathematical Tools for Cryptography: Substitutions and Permutations, Modular Arithmetic, Euclids Algorithm, Finite fields, Polynomial Arithmetic, Discrete Logarithms .Conventional Symmetric Encryption algorithms: theory of Blocks Cipher Design, Feistel Cipher Network structure, DES and Triple DES.
MODULE II PUBLIC KEY CRYPTOGRAPHY
Prime Numbers and testing for Primality, Factoring, Large Numbers, RSA, DiffleHellman , EIGamal, Key, Exchange Algorithms, Public-key Cryptography Standards , Hashes and Messages Digests Authentication, MID5, SHA , RIPEMD, HMAC.
MODULE III DIGITAL SIGNATURES
Certificates, User Authentication: Digital Signature Standard ( DSS and DSA) Security Handshake Pitfalls, Elliptical Curve Cryptosystems, Authentication of Systems :Kerberos V4, and V5,Electronic mail Security: Pretty Good privacy(PGP)
MODULE IV SECURITY PLANNING
Risk Analysis, Organisational Security Policies, physical Security, Legal Privacy and Ethical issues in Computer Security :Protecting Programs and data Information and the law , Rights of Employees and Employers, Software failures, Computer crime, Praia issues in Computer Security , Case studies of Ethics. Reference Books 1. Forouzan, Cryptography Security And Network Security, TMH 2. Kahate, Cryptography Security And Network Security, TMH 3. Charies P. Pfleeger, Shari Lawrence Pfleeger, PHI. 4. Cryptography & Network Security: William Stalling. 5. Whitman, Principles of Information Security, Cengage/Thomson
MBA 662 SYSTEM ANALYSIS AND DESIGN
MODULE I INTRODUCTION TO SAD Overview of system analysis and design business systems concepts, system development life cycle, project selection: source of project requests, managing project review and selection , preliminary investigation.
MODULE II FEASIBILITY STUDY
Feasibility study: different types of feasibility, investigative study, cost, benefit analysis, fact findings.
MODULE III SPECIFICATIONS & ANALYSIS
System requirement specifications and analysis: data flow diagrams, data dictionaries, hipo, decision tables, decision trees, Warnier diagram and Nassi- Shneidermen charts, system controls and audit trail, system administration and training , conversion and operational plan.
MODULE IV ORGANIZATIONAL ISSUES
Organizational issues: attributes of a good analysis, the system analysis and law, communicating with computers: ergonomics, human problems in the automated office, designing human machine systems. Reference Books 1. Awad, Elias M. Systems Analysis and Design, Prentice Hall of India, New Delhi. 2. Sharma A.K. Analysis, Design & Implementation of Information System, Vikas Publishing House, New Delhi 3. Satzinger, System Analysis and Design, Thomson Learning, Bombay. 4. Coad, Peter and Edward, Yourdon. Object-Oriented Analysis. 2nd ed., Englewood Cliff, New Jersey, Yourdon Press. 5. Hawryszkiewyez, I T. Introduction to Systems Analysis and Design. 2nd ed., New Delhi, Prentice Hall Of India. 6. Marco, T.d. Structured Analysis & System Specification, New Delhi. Yourdon Press. 7. Rajaraman, V.Analysis and Design of Information Systems. New Delhi, Prentice Hall of India. 8. Van Over, David. Foundations of Business Systems. Fort Worth, Dryden Press. 9. Whitten, J L. System Analysis and Design Methods. New Delhi, Galgotia