Free Essay

Cryptography Best Practices and Resource Portfolio Part B

In:

Submitted By eaalvare
Words 1420
Pages 6
1. Background 3
2. Network, Transport, Application Layers and their Protocols 3
2.1 Network Layer 3
2.2 Transport Layer 3
2.3 Application Layer 4
3. Hardware solutions for TechE Inc 4
4. Data, Reputation & Financial losses 4
5. Security Threats 4
6. Intruders 5
7. Different types of Security Services 5
8. Standards 6
9. Conclusion 6

1. Background
Provide the mission statement of TechE Inc and the objective of TechE Inc, plays in the cloud market. TechE Inc is a cloud provider to small medium business markets and its partners to provide cloud solutions with Security in mind. Following the completion of the background of TechE Inc provide a review of the portfolio Part A that was discuss in the first meeting.
Provide a high level history of TechE Inc and the role it plays in the IT industry. TechE Inc is a cloud solutions provider and advisor to SMBs focusing on virtualization and cloud solutions. In this topic the focus will be the important role Information Systems Security plays in the organization and as one of the main players on keeping TechE Inc secured, their customers and its partners.
2. Network, Transport, Application Layers and their Protocols
2.1 Network Layer
The network layer is part of the OSI model and it functions in layer3. This layer and its protocols are responsible for the functional means of transferring the data in sequence from a source to destination. At the same time maintaining quality assurance to ensure full delivery.
2.1.1 Internet Protocol Security (IPsec)
The IPsec is a series of collection of none standards used to ensure the confidentiality, integrity and authentication of communications conducted over a network. This protocol encrypts at this network layer and authenticates to an end to end security solution. IPsec also provides services through the use of two additional protocols. The Authentication Header (AH) and Encapsulation Security payload (ESP) protocol.
2.1.1.1. Authentication Header (AH)
The Authentication Header Protocol facilitates access control, authenticated data origin, connectionless integrity, and rejects replay attacks.
2.1.1.2. Encapsulation Security payload (ESP)
The Encapsulation Security payload (ESP) protocol assures confidentiality of IP data in transit across a network.
2.1.2 Internet Key Exchange (IKE)
This is the second technology used under this protocol and network layer. The IKE provides security associations and it works in two phases. The first phase two IKE peers establish a secured connection by using the common IKE security association using main or aggressive mode in case. The second phase, security associates are negotiated on behalf of services using a quick mode exchange.

2.2 Transport Layer
The Secure Socket Layer (SSL) provides encryption and authentication in a session. It is a secure pipeline between two lines that have server authentication. This type of protocol is the common used today to establish security and encryption.

2.3 Application Layer
2.3.1 S/MIMME
The first security protocol under this layer is the S/MIME. It provides a second layer security on top of the standard MIME data thru the use of the enveloped, signed, and clear-signed data.
2.3.2 Secure Electronic Transaction (SET)
The second protocol layer is called Secure Electronic Transaction (SET). It provides a framework that protects payment transactions cards used in the ecommerce business.

3. Hardware solutions for TechE Inc
In this section I will highlight the different cryptographic hardware that are solutions for TechE Inc.

3.1.1 Authentication Tokens
Authentication tokens are physical devices that contain a microprocessor and semiconductor memory. These tokens provide automatic information encoded on the token itself. These devices can come in many different sizes, shapes, and materials. These attributes are known as the token's form factor. Form factors fall into two general categories: noncontact tokens and contact tokens. They include
Proximity cards, one time password generators, challenge/repose calculators, smart cards
3.1.2 Biometrics
Biometrics is the science of measuring the characteristics of the human body. These devices are increasing and utilized for authentication method due to high security. These systems operating in two phases the first phase is enrollment and the second is verification.
The common types of biometric systems are the following: Fingerprint, Optical, Facial, Voice, Signature, and Keystroke.
4. Data, Reputation & Financial losses
In this section there are three different type of losses and how they can impact TechE Inc. The following three types are

• Loss of data: This type of loss can include financial health information that is critical.
• Loss of reputation: This can result from a breach in security and result in end users deciding to abandon a service or product.
• Financial losses: Direct financial theft, this includes the impact of the other two types of losses.

5. Security Threats
This section will provide types of security threats that can impact TechE Inc. These include the following:

• Unauthorized disclosure of data: Results from unauthorized access of information and revealing it. The revealing of the information can be either intentional or accidental.
• Unauthorized data modification: The modification, deletion, or destruction of data or software on purpose or by accident.
• Unauthorized access: Occurs when an unauthorized person gains system or network access, often by posing as a legitimate user of the network. This can be accomplished by password sharing, password guessing, and password capture.
• Disclosure of network traffic: By obtaining information as it travels across the network. Sniffers are often used to capture user names, passwords, e-mail messages, application data, critical records, and more that pass over a network.
• Spoofing of network traffic: The "ability to receive a message by masquerading as the legitimate receiving destination, or masquerading as the sending machine and sending a message to a destination.
6. Intruders
In this section I will provide the different intruders that can motivate havoc into TechE Inc network.

• Insiders: Could be an employee, contractor, or vendor who has been given authorization to access the system.
• Hackers: Also called crackers, these are individuals who generally break into a network for the thrill or bragging rights.
• Terrorists: Terrorist groups that have begun to make extensive use of the Internet to conduct operational planning, raise funds, spread propaganda, and communicate securely.
• Foreign Intelligence Services (FIS): Several countries routinely employ hackers to collect sensitive, proprietary government and industry information. This information is then shared with concerned individuals, including their own country's national industries.
• Hacktivists: These individuals are cause oriented and generally engage in attacks on publicly accessible web pages or e-mail servers. Targets can include governments and large, multinational corporations.
7. Different types of Security Services
A security service is a collection of policies, procedures, and other controls that are implemented to help reduce the risk associated with the threat of data loss or possible compromise. The main areas of security services include the following:
• Authentication: Ensure that individuals accessing the network are authorized.
• Confidentiality: Used to ensure that the data is not compromised and disclosed to unauthorized parties.
• Integrity: Ensure that unauthorized parties do not modify data, software, and messages.
• Nonrepudiation: This is a service that can be used to ensure that the entities involved in a communication cannot deny having participated in it.
8. Standards
In this section I will cover and complete the standards, guidelines, and regulations that are necessary to ensure that security has been properly implemented
The following are organizations involved in this effort
• Internet Engineering Task Force (IETF): An "international community of network designers, operators, vendors, and researchers involved in the technical operation of the Internet and the continuing evolution of Internet architecture" (www.isoc.org).
• ANSI X9: A division of ANSI that "develops and publishes voluntary, consensus technical standards for the financial services industry" (consortiuminfo.org).
• National Institute of Standards and Technology (NIST): U.S. government agency that has published guidelines and standards on the topic of information security, including the federal information processing standard (FIPS 140-1), which describes a standard for secure cryptographic modules. NIST also administers a certification process for software and hardware crypto modules.
• Common Criteria: An international effort devoted to the development of criteria for evaluation of information security.
• Health Insurance Portability and Accountability Act (HIPAA): A federal law that governs the standards for access to patient records as well as the transmission of electronic health information in between organizations.
9. Conclusion
Setting up all these different security policies into TechE Inc will benefit the cloud solutions organization specially, but will be the corner stone and perhaps the model of the over main security at TechE Inc.

Similar Documents

Premium Essay

Syllabas

...Chandigarh-160 014 (India) Telefax: 0172-2701403 Phone: 0172-2534889 Email: uiams@pu.ac.in Website: uiams.puchd.ac.in SYLLABUS OF THE 1ST YEAR TRIMESTER – I CODE MBA-011 MBA-021 MBA-031 MBA-041 MBA-051 MBA-061a MBA-061b PAPER Principles and Practices of Management Quantitative Techniques for Managerial Decision Making. Managerial Economics Human Resource Management Accounting for Management Seminar on Executive Communication Workshop on Information Technology for Management CREDITS 4 4 4 4 4 2 2 MARKS 100 100 100 100 100 50 50 TRIMESTER – II CODE MBA-072 MBA-082 MBA-092 MBA-102 MBA-112a MBA-112b PAPER CREDITS Quantitative Methods and Operations Research 4 Economic Environment for Business 4 Production and Operations Management 4 Financial Management 4 Seminar on Negotiation Skills 2 Workshop on Management Information Systems 2 o Introduction to Retail Management (R. Mgt.)* 4 SECTORAL SUBJECT – 1 MARKS 100 100 100 100 50 50 100 o Principles of Banking and Insurance (B & I)* o Introduction to IT and Telecommunications (IT & Tel)* o Introduction to Infrastructure (Infra. Mgt.)* o Industrial Pharmacy and Pharmaceutical Technology (Pharma. Mgt.)* o Hospital Planning and Organization (Hosp. Mgt.)* MBA-122 *R. Mgt= Retail Management; B&I= Banking & Insurance; IT & Tel.= IT & Telecommunication; Infra. Mgt.=Infrastructural Management; Pharma. Mgt.=Pharmaceutical Management; Hosp. Mgt.=Hospital Management. TRIMESTER – III CODE MBA-133 MBA-143 MBA-153 MBA-163a MBA-163b...

Words: 30662 - Pages: 123

Premium Essay

Dodi 8500.01

...Department of Defense INSTRUCTION NUMBER 8500.01 March 14, 2014 DoD CIO SUBJECT: Cybersecurity References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues and renames DoD Directive (DoDD) 8500.01E (Reference (a)) as a DoD Instruction (DoDI) pursuant to the authority in DoDD 5144.02 (Reference (b)) to establish a DoD cybersecurity program to protect and defend DoD information and information technology (IT). b. Incorporates and cancels DoDI 8500.02 (Reference (c)), DoDD C-5200.19 (Reference (d)), DoDI 8552.01 (Reference (e)), Assistant Secretary of Defense for Networks and Information Integration (ASD(NII))/DoD Chief Information Officer (DoD CIO) Memorandums (References (f) through (k)), and Directive-type Memorandum (DTM) 08-060 (Reference (l)). c. Establishes the positions of DoD principal authorizing official (PAO) (formerly known as principal accrediting authority) and the DoD Senior Information Security Officer (SISO) (formerly known as the Senior Information Assurance Officer) and continues the DoD Information Security Risk Management Committee (DoD ISRMC) (formerly known as the Defense Information Systems Network (DISN)/Global Information Grid (GIG) Flag Panel). d. Adopts the term “cybersecurity” as it is defined in National Security Presidential Directive-54/Homeland Security Presidential Directive-23 (Reference (m)) to be used throughout DoD instead of the term “information assurance (IA).” 2. APPLICABILITY a. This instruction applies to: (1) OSD, the...

Words: 19443 - Pages: 78

Premium Essay

Case New Belgium Brewing (B)

...Case New Belgium Brewing (B) New Belgium Brewing: Developing a Brand Personality * Background NEW BELGIUM’S INITIAL MARKETING STRATEGY The idea for the New Belgium Brewing Company began with a bicycling trip through Belgium. Belgium is arguably the home of some of the world’s finest ales, some of which have been brewed for centuries in that country’s monasteries. As Jeff Lebesch, an American electrical engineer, cruised around that country on his fat-tired mountain bike, he wondered if he could produce such high-quality beers back home in Colorado. After acquiring the special strain of yeast used to brew Belgian-style ales, Lebesch returned home and began to experiment in his Colorado basement. When his beers earned thumbs up from friends, Lebesch decided to market them. The New Belgium Brewing Company opened for business in 1991 as a tiny basement operation in Lebesch home in Fort Collins. Lebesch wife, Kim Jordan, became the firm’s marketing director. New Belgium beers quickly developed a small but devoted customer base, first in Fort Collins and then throughout Colorado. The brewery soon outgrew the couple’s basement and moved into an old railroad depot before settling into its present custom-built facility in 1995. The company’s standard line has grown to include Sunshine Wheat, Blue Paddle Pilsner, Abbey Ale, Trippel Ale, 1554 Black Ale, and the original Fat Tire Amber Ale, still the firm’s bestseller. Today, New Belgium Brewing is America’s third largest...

Words: 3109 - Pages: 13

Free Essay

Sql Server Security Best Practise

...SQL Server 2012 Security Best Practices - Operational and Administrative Tasks SQL Server White Paper Author: Bob Beauchemin, SQLskills Technical Reviewers: Darmadi Komo, Jack Richins, Devendra Tiwari Published: January 2012 Applies to: SQL Server 2012 and SQL Server 2014 Summary: Security is a crucial part of any mission-critical application. This paper describes best practices for setting up and maintaining security in SQL Server 2012. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...

Words: 15647 - Pages: 63

Premium Essay

Links

...e., six semester Part-time programme offered to Working Executives and employees. 1. ELIGIBILITY CONDITIONS 1.1 M.B.A. (Day) Candidate seeking admission into Full Time M.B.A. (Day) programme must be: 1. Bachelor degree holder of Osmania University or a degree recognized by the university as equivalent thereto and /(or) as per the rules laid down by the University; 2. The candidate seeking admission must qualify in the Entrance Examination, conducted by the appropriate authority in the year of admission as per the norms prescribed by the University. 3. The admission of Non-resident Indians and candidates admitted in lieu of them will be as per the University Rules in force on the date of the admission. 4. Foreign candidates’ admission is based on the Screening Process of the University currently in vogue. 1.2 M.B.A. (Evening) Candidate seeking admission into Part-Time M.B.A. (Evening) Programme has to satisfy the following Conditions: 1. Must be a Bachelor Degree holder of Osmania University or a Degree recognized by the university as equivalent thereto and/ (or) as per the Rules laid down by the University. 2. The candidate seeking admission must qualify in the entrance examination conducted by the appropriate authority in the year of admission as per the norms prescribed by the University. a. Must have at least Two years experience in Executive / Managerial /Administrative/ Supervisory position in any organization after obtaining the Bachelor Degree. Or b. Officers / Executives...

Words: 20223 - Pages: 81

Premium Essay

Paper

...President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Professional Group Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or...

Words: 229697 - Pages: 919

Premium Essay

Information and Survey Analysis

...1. An IS auditor is reviewing access to an application to determine whether the 10 most recent "new user" forms were correctly authorized. This is an example of: A. variable sampling. B. substantive testing. C. compliance testing. D. stop-or-go sampling. The correct answer is: C. compliance testing. Explanation: Compliance testing determines whether controls are being applied in compliance with policy. This includes tests to determine whether new accounts were appropriately authorized. Variable sampling is used to estimate numerical values, such as dollar values. Substantive testing substantiates the integrity of actual processing, such as balances on financial statements. The development of substantive tests is often dependent on the outcome of compliance tests. If compliance tests indicate that there are adequate internal controls, then substantive tests can be minimized. Stop-or-go sampling allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed. 2. The decisions and actions of an IS auditor are MOST likely to affect which of the following risks? A. Inherent B. Detection C. Control D. Business The correct answer is: B. Detection Explanation: Detection risks are directly affected by the auditor's selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks are controlled by the actions of the company's management. Business...

Words: 97238 - Pages: 389

Premium Essay

There Are over 120 Kfc and Pizza Hut Outlets in Singapore, Employing About 5,000 Staff. Both Brands Also Offer Singapore-Wide Delivery Services

... 2. COURSE DURATION The MBA (Full Time) programme of Mahatma Gandhi University shall be spread in two years duration with 4 Semesters. Each semester shall comprise of a minimum of 16 instructional weeks of 5 days each of 5 hours a day (total contact hours 400). Continuous Internal Evaluation during the course period and University examination at the end of each semester shall be conducted. There shall be a semester break of 15 days each in addition to the usual Onam, Christmas and summer holidays. 3. ELIGIBILTY FOR ADMISSION 1. A pass in any Bachelor’s Degree Examination of Mahatma Gandhi University or an equivalent degree of any other universities duly recognized by M.G.University with not less than 50% marks in the aggregate for all parts of examination or a Master’s Degree examination with 50% marks in aggregate. 2. SC/ST students A pass in any Bachelor’s Degree examination is needed for SC/ST candidates 4. ADMISSION PROCEDURE Admission to MBA Degree programme of the study shall be on the basis of merit as determined by MAT/CAT/XAT /MGU-MAT and Group discussion & interview conducted by Mahatma Gandhi University. A five member...

Words: 20659 - Pages: 83

Premium Essay

Mba Special Assignment

...UNIVERSITY DEPARTMENTS ANNA UNIVERSITY CHENNAI : : CHENNAI 600 025 REGULATIONS - 2009 CURRICULUM I TO IV SEMESTERS (FULL TIME) MASTER OF BUSINESS ADMINISTRATION (MBA) SEMESTER – I |Code No. |Course Title |L |T |P |C | |BA9101 |Statistics for Management |3 |1 |0 |4 | |BA9102 |Economic Analysis for Business |4 |0 |0 |4 | |BA9103 |Total Quality Management |3 |0 |0 |3 | |BA9104 |Organizational Behaviour |3 |0 |0 |3 | |BA9105 |Communication Skills |3 |0 |0 |3 | |BA9106 |Accounting for Management |3 |1 |0 |4 | |BA9107 |Legal Aspects of Business |3 |0 |0 |3 | |BA9108 |Seminar I – Management Concept |0 |0 |2 |1 | | |Total | | | |25...

Words: 17609 - Pages: 71

Free Essay

Applied Soa

...Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA: Service-Oriented Architecture and Design Strategies Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright  2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-22365-9 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and...

Words: 218699 - Pages: 875

Premium Essay

Information System

...Incorrect .1) | Which of the following is NOT a primary function performed by a telecommunications network? |   | |   | A. | transmission of voice |   | B. | network control |   | C. | tracking of out-of-service devices (Your Answer) |   | D. | transmission of data |   | E. | All of the above are primary functions of telecommunication (Correct Answer) | Incorrect | | |   Q.2) | Which of the following most accurately describes the INTERFACE function of telecommunications? |   | |   | A. | checking for errors and putting the communicaiton into a standardized format |   | B. | handing interactions between users and the network (Correct Answer) |   | C. | keeping track of the status of the network (Your Answer) |   | D. | choosing the most efficient path for a message to be sent over the Internet |   | E. | changing coding system or speed when moving data between devices on the network | Incorrect | | |   Q.3) | Which of the following is NOT a characterisitic of fiber-optic transmission? |   | |   | A. | faster transmission than twisted pair of wires |   | B. | more secure than other media because it does not emit radiation |   | C. | requires much less space because the fiber-optic cable is very small in diameter (Your Answer) |   | D. | easy to work with the tiny fiber and require much cheaper equipment (Correct Answer) |   | E. | not affected by power-line surges or electromagnetic...

Words: 21426 - Pages: 86

Premium Essay

Personal Statement

...Medical Smart Card System for Patient Record Management Changrui Xiao and Arthur Yu Bears Breaking Boundaries 2009 Science, Technology, and Energy Policy White Paper Competition Executive Summary (Abstract) Rising healthcare spending has led to an increase in calls for ways to reduce the cost of healthcare. Amid the debate on the best approach on cut costs in the healthcare system, one of the few bipartisan provisions is the need to integrate modern technology into the storage and transfer of medical records. Current attempts to establish such electronic medical records are challenged by concerns about patient privacy, issues with the incorporation of old records, and budget limitations. We propose the development of personal portable healthcare record smart cards and a corresponding framework to simplify maintenance and transfer of patient records as an incremental step towards a nationalized electronic records system. Our proposal is a feasible and cost-effective system that applies existing technology to address inefficiencies of the current paper based medical records system; simultaneously, it also serves as a transition system to facilitate the adoption of completely electronic medical records. Author Affiliations: Xiao and Yu are both undergraduates at UC Berkeley. Contact Information: ayu.yua@gmail.com or crx687@berkeley.edu 1 1. Introduction During the second half of the 20th century, the national expenditure on healthcare increased dramatically. As of...

Words: 4983 - Pages: 20

Premium Essay

Student

...Diploma in Art & Design Professional Diplomas in Business Professional Diplomas in Computing Higher National Diploma BA (Hons) International Business Management BA (Hons) International Business Management (Flexible Study Programme) BA (Hons) Business Finance & Accounting BA (Hons) Graphic Design BA (Hons) Fine Art Exp. Media BSc (Hons) Computing BA (Hons) Communications & Media Studies MSc International Management MSc Computing Accreditation & Validation UK/Pearson Credit system Transfer of credits Student support Accommodation Study Advising and Support Financial support Visas for foreign students Scholarships Benefits for students Study abroad Internships Assistance in employment Counselling Centre Student Resources Computer labs Online Learning Centre (Moodle) Prague College email Physical library Digital Library ISIFA Images Textbooks and class materials Graphic Design/Interactive Media/Fine Art materials and costs Personal computers Message boards and digital signs Newsletters Open lectures, seminars and events Student ID cards Centre for Research and Interdisciplinary Studies (CRIS) Prague College Student Handbook 4 6 8 9 11 12 13 14 16 18 20 22 24 26 28 29 30 31 32 33 33 34 35 36 Prague College Humanities Society Student Council Alumni Association International Student Association (ISA) Leadership Association Regulations, Policies and Procedures General regulations Equal opportunities...

Words: 27092 - Pages: 109

Premium Essay

Mba Syllabus

...13103 MB 13104 MB 13105 MB 13106 SRM University MBA - Revised Curriculum - 2013-14 Semester –I Thinking and Communication Skills (Practical) Accounting for Decision Making Philosophy for Management Economics for Managers Managerial Statistics Managerial Skills (Practical) Semester-II Financial Management Management Information System Marketing Human Resource Management Production And Operation Management Legal Aspects of Business Semester- III Summer Internship (8 weeks)(Practical) Entrepreneurship Strategic Management Business Analytics (Practical) Elective-1 Elective-2 Elective-3 Elective-4 Semester- IV Elective-5 Elective-6 Industrial Elective (Practical) Total Credit L 0 2 3 2 2 0 T 0 4 0 2 4 0 P 4 0 0 0 0 6 C 2 4 3 3 4 3 19 4 3 4 2 4 3 20 2 3 3 2 3 3 3 3 22 3 3 5 11 72 MB 13207 MB 13208 MB 13209 MB 13210 MB 13211 MB 13212 MB 13313 MB 13314 MB 13315 MB 13316 2 2 3 2 3 2 0 2 2 0 2 2 2 2 2 2 0 4 2 2 0 2 2 0 2 2 0 2 2 2 2 2 2 0 0 0 0 0 0 0 4 0 0 4 0 0 0 0 0 0 10 MB 13417 Functional Electives Marketing Finance Systems Human Resource Operations Vertical Electives Pharma Hospitality Enterprise Resource Planning Agriculture Hospital and Health Care Retailing Auto Industry Project Management Media and Communication Banking Financial Service Insurance   2 MB 13FM01 MB 13FM02 MB 13FM03 MB 13FM04 MB 13FM05 MB 13FM06 MB 13FM07 MB 13FM08 MB 13FM09 MB 13FM10 MB 13FM11 MB 13FM12 MB 13FM13 MB 13HR01 MB 13HR02 MB 13HR03 MB 13HR04 MB 13HR05 MB 13HR06...

Words: 53231 - Pages: 213

Free Essay

Accounting

...Click here to download the solutions manual / test bank INSTANTLY!! http://testbanksolutionsmanual.blogspot.com/2011/02/accounting-information-systems-romney.html ------------------------------------------------------------------------------------------------------------------------ Accounting Information Systems Romney 11th Edition Solutions Manual Accounting Information Systems Romney 11th Edition Solutions Manual Accounting Information Systems Romney 11th Edition Solutions Manual Accounting Information Systems Romney Steinbart 11th Edition Solutions Manual Accounting Information Systems Romney Steinbart 11th Edition Solutions Manual ------------------------------------------------------------------------------------------------------------------------ ***THIS IS NOT THE ACTUAL BOOK. YOU ARE BUYING the Solution Manual in e-version of the following book*** Name: Accounting Information Systems Author: Romney Steinbart Edition: 11th ISBN-10: 0136015182 Type: Solutions Manual - The file contains solutions and questions to all chapters and all questions. All the files are carefully checked and accuracy is ensured. - The file is either in .doc, .pdf, excel, or zipped in the package and can easily be read on PCs and Macs.  - Delivery is INSTANT. You can download the files IMMEDIATELY once payment is done. If you have any questions, please feel free to contact us. Our response is the fastest. All questions will always be answered in 6...

Words: 18533 - Pages: 75