Syllabus BCA 6th Sem
Syllabus BCA 6th Sem
E-COMMERCE
L T P
3 1 0
COURSE OUTCOMES (COs)
After the completion of the course, students are expected to have the ability to:
CO-1. Understand the foundations and importance of E-commerce.
CO-2. Understand the concept of Mobile commerce.
CO-3. Analyze the importance of encryption on E-commerce.
CO-4. Determining the effectiveness of electronic payments as an emerging financial
instrument.
Unit-1 12
Introduction: What is E-commerce, forces behind E-commerce industry framework, brief history
of ecommerce, inter organizational E-commerce intra organizational E-commerce, and consumer
to business electronic commerce, architectural framework.
Unit-2 08
Mobile Commerce: Introduction to mobile commerce, mobile computing application, wireless
application protocols, WAP technology, mobile information devices, web security introduction to
web security, firewalls & transaction security, client server network, emerging client server
security threats, firewalls and network security.
Unit-3 08
Encryption: World wide web & security, encryption, transaction security, secret key encryption,
public key encryption, virtual private network (VPN) and implementation management issues.
Unit-4 12
Electronic Payments: Overview of electronics payments, digital token-based electronics payment
system, smart cards, credit card I debit card-based EPS, emerging financial instruments, and online
banking.
Text Books:
1. Greenstein and Feinman, “E-Commerce”, TMH.
2. Ravi Kalakota, Andrew Whinston, “Frontiers of Electronic Commerce”, Addision Wesley.
3. Pete Lohsin , John Vacca “Electronic Commerce”, New Age.
Reference Books:
1. Denieal Amor, “The E-Business Revolution”, Addision Wesley.
2. Diwan, Sharma, “E-Commerce”, Excel.
3. Bajaj & Nag, “E-Commerce: The Cutting Edge of Business”, TMH.
BCA-602
CYBER LAW AND INTERNET SECURITY
L T P
3 1 0
COURSE OUTCOMES (COs)
After the completion of the course, students are expected to have the ability to:
CO-1. Understand the social and intellectual property issues emerging from cyber space.
CO-2. Explore the legal and policy developments in various countries to regulate cyber space.
CO-3. Understand the Intellectual Property Rights, Domain Names and Trademark Dispute.
CO-4. Learn about developing secure information system and security policies to prevent
criminal activity on the Internet.
Unit-1 12
Cyber Space Jurisdiction: Jurisdiction issues under IT Act, 2000, traditional principals of jurisdiction,
extra-terrestrial jurisdiction and case laws on cyber space jurisdiction.
E–commerce and Laws in India: Digital / Electronic signature in Indian laws, E–commerce; issues
and provisions in Indian law, and E –Governance.
Unit-2 08
Intellectual Property Rights, Domain Names and Trademark Dispute: Concept of trademarks in
internet era, cybersquatting, reverse hijacking, jurisdiction in trademark disputes, copyright in the
digital medium, and copyright in computer programs
Unit-3 10
Developing Secure Information Systems: Information security governance & risk management,
security architecture & design security issues in hardware, data storage & downloadable devices,
physical security of IT assets, access control, CCTV and intrusion detection systems and backup
security measures.
Unit-4 10
Security Policies: Development of policies, WWW policies, email security policies, policy review
process-corporate policies-sample security policies, publishing and notification requirement of the
policies.
Text Books:
1. Prashant Mali, “Cyber Law & Cyber Crimes”, Snow White publications, Mumbai.
2. Dr. Surya Prakash Tripathi, Ritendra Goyal and Praveen Kumar Shukla, “Introduction to
Information Security and Cyber Law”, Willey Dreamtech Press.
3. Sarika Gupta & Gaurav Gupta, “Information Security and Cyber Laws”, Khanna Publishing House.
Reference Books:
1. Farooq Ahmad “Cyber Law in India”, Pioneer Publications.
2. Vakul Sharma, “Information Technology Law and Practice”, Universal Law Publishing Co. Pvt. Ltd.
3. Suresh T. Vishwanathan, “The Indian Cyber Law”, Bharat Law House New Delhi.
BCA-603
MOBILE COMPUTING
L T P
3 0 0
Unit-1 10
Introduction: Issues in mobile computing, characteristics of mobile computing, structure of mobile
computing and overview of wireless telephony: cellular concept.
Unit-2 10
Evaluation of Mobile System and Wireless Network: GSM, CDMA, FDMA, TDMA; Wireless
networking: Wireless LAN overview, Bluetooth, wireless multiple access protocols, TCP over
wireless, wireless applications, data broadcasting, mobile IP and WAP.
Unit-3 08
Data management issues: Management issues, hoarding techniques, data replication for mobile
computers, adaptive clustering for mobile wireless networks and file system.
Unit-4 12
Mobile Agents and Routing algorithms: Mobile agent, security and fault tolerance, transaction
processing in mobile computing environment, Mobile Adhoc Networks (MANETs), Routing protocols,
Global State Routing (GSR), Destination Sequenced Distance Vector routing (DSDV) and Dynamic
Source Routing (DSR) and Ad Hoc On-demand Distance Vector routing (AODV).
Text Books:
Reference Books:
Unit-1 10
Introduction to Security: Introduction to security: Attacks, services & mechanisms, security.
Conventional encryption model, classical encryption techniques, steganography, modern techniques:
simplified DES, block cipher principles, DES standard, DES strength, differential & linear
cryptanalysis, block cipher design principles and block cipher modes of operation.
Unit-2 08
Conventional Encryption Algorithms: Conventional Encryption Algorithms: Triples DES, blowfish,
International data encryption algorithm, RC5, placement of encryption function and key distribution.
Unit-3 10
Public Key Encryption: Public Key Encryption: public, key cryptography: principles of public, key
cryptosystems, RSA algorithm, key management, Fermat’s & Euler’s theorem, primality test and the
Chinese remainder theorem.
Unit-4 12
Message Authentication & Hash Functions: Message Authentication & Hash Functions:
Authentication requirements, authentication functions, message authentication codes, hash function,
md5 message digest algorithm, secure hash algorithm (SHA), and digital signatures.
Text Books:
1. William Stallings, “Cryptography and Network Security: Principles and Practice”, Prentice Hall,
New Jersey.
2. Atul Kahate, “Cryptography and Network Security”, TMH.
3. Douglas R. Stinson, “Cryptography: Theory and Practice”, CRC press.
Reference Books:
1. William Stallings, “Network Security Essentials: Applications and Standards”, Prentice Hall.
2. Johannes A. Buchmann, “Introduction to cryptography”, Springer, Verlag.
3. Wenbo Mao, “Modern Cryptography: Theory and Practice”, Prentice Hall PTR.
4. Simon Rubinstein Salzedo, “Cryptography”, Springer.