You are on page 1of 5

BANSAL INSTITUTE OF ENGINEERING &TECHNOLOGY, LUCKNOW CS/IT DEPARTMENT LECTURE SCHDULE (LS) YEAR: 4 SEM: 5 SUBJECT: INFORMATION SECURITY

& CYBER LAW SUB.CODE: ECS-505 FACULTY NAME: ASHUTOSH SINGH Lecture No. 1. 2. 3. Contents UNIT 1
History of Information Systems and its Importance, basics, Changing Nature of Information Systems Need of Distributed Information Systems Role of Internet and Web Services, Information System Threats and attacks, Classification of Threats and Assessing 3 Damages Security in Mobile and Wireless ComputingChallenges in Mobile Devices,Authentication Service Security, Laptops Security Security Implication for Security 3

No. of Lectures 2

1 2

4. 5. 6. 7.

organizations, 1

Basic Principles of Information Security, Confidentiality, 3 Integrity Availability and other terms in Information Security, Information Classification and their Roles

TOTAL UNIT 2 8. 9. 10.

15

Security Threats to E Commerce, Virtual Organization, 2 Business Transactions on Web E-Governance and EDI, Concepts in Electronics payment 3 systems, E Cash, Credit/Debit Cards Physical Security- Needs, Disaster and Controls, Basic Tenets 2 of Physical Security and Physical Entry Controls, Access Control- Biometrics, Factors in Biometrics Systems, 2 Benefits, Criteria for selection of biometrics. Design Issues in Biometric Systems, Interoperability Issues, 3 Economic and Social Aspects, Legal Challenges

11. 12.

TOTAL UNIT 3 13.

10

Model of Cryptographic Systems, Issues in Documents 3 Security, System of Keys, Public Key Cryptography Digital Signature, Requirement of Digital Signature System, 2 Finger Prints Firewalls, Design and Implementation Issues, Policies. Network 2 Security- Basic Concepts Dimensions, Perimeter for Network Protection, Network 3 Attacks, Need of Intrusion Monitoring and Detection Intrusion Detection Virtual Private Networks- Need, Use of Tunneling with VPN, 3 Authentication Mechanisms,Types of VPNs and their Usage, Security Concerns in VPN

14.

15.

16.

17.

TOTAL UNIT 4 18.

13

Security metrics- Classification and their benefits,Information 2 Security & Law Information Security & Law, IPR, Patent Law, Copyright Law, 3 Legal Issues in Data mIning Ethics- Ethical Issues, Issues in Data and Software Privacy 3 Cyber Crime Types & overview of Cyber Crimes

19.

20.

TOTAL GRAND TOTAL

8 46

SAGAR INSTITUTE OF TECHNOLOGY AND MANAGEMENT, BARABANKI CS/IT DEPARTMENT LESSION PLANE (LP) YEAR: 4 SEM: 7 SUBJECT: PARALLEL ALGORITHMS SUB. CODE: 073 PAPER ID: FACULTY NAME: UDAI KUMAR JHA Lecture No. Description Date of Lecture Signature Sequential model, need of L1. alternative model parallel computational models L2. such as PRAM LMCC, Hypercube L3. Cube Connected Cycle, Butterfly, Perfect Shuffle L4. Computers, Tree model, Pyramid model L5. Fully Connected model, L6. PRAM-CREW EREW models simulation of one L7. model from another one UNIT 2 Performance Measures of L8. Parallel Algorithms speed-up and efficiency of PA L9. Cost- optimality L10. An example of illustrate Costoptimal algorithms- such as L11. summation Min/Max on various L12. Models. UNIT 3 Sorting ,Rank, Compare and L13. exchange sorting algorithm Data partitioning, Bubble sort And odd even transpoeition L14. sort Parallel code ,merge sort L15. ,parallelizing quicks sort Odd even mergesort,Bitonic L16. merge sort Quick sort as hypercube L17. Parallel merging algorithm L18. on Crew,Erew,Mcc

L19 L20. L21 L22. L23. L24 L25.

Parallel merging algorithm on,Erew,Mcc Parallel sorting N/W on Crew Parallel sorting N/W on,Erew,Mcc UNIT 4 Parallel Searching Algorithm BRANCH AND BOUND, ALPHA-BETA SEARCH, Parallel Alpha Beta Search MATRIX OPERATION Matrix Addition, matrix multiplication, IMPLEMENTING MARTIX MULTICATION 1.Algorith (a). sequential code (b). Direct Implementation (c). Recursive Implementation Mesh Implementation, Matrix vector Multiplication SOLVING A SYSTEM OF LINER EQUATIONS 1.Linear Equations 2.Gaussian Elimination 3. Parallel Implementation Root finding. Kth element, Kth element in X+Y on PRAM UNIT 5 Graph Algorithms Connected Graphs search and traversal 1.DFS 2.BFS 3.Prime Algorithm 4.Kuskal Algorithm 5.Dijkstras Algorithm

L26.

L27 L28.

L29.

L30. L31.

L32.

L33.

L34.

L35.

Combinatorial AlgorithmsPermutation, Combinations, Derrangements.

You might also like