Course Objective:-  To understand the architecture and working methodology of the e-commerce,and relevant issues of electronic business transactions.

Course Outcomes:

  1. Recognize  the concept & need  of business transactions to be carried over electronically.
  2. Determine & analyze the different business models, trade-cycles existing.
  3. Engage and analyze the concept of universal data standards required for data interchange.
  4. Explain & identify the norms, regulatory, legal environments ethical issues needed for carrying out business transactions electronically.
  5. Judge the aspects of security implementation in electronic transaction.

Course Objective: The students will be able to identify the security threats, monitor them and employ the knowledge of security services and mechanisms to counter them.
Course Outcome:
  1. Recalling basic network protocols and identifying potential security issues in a network.
  2. Explain the foundational concepts of cryptography and associate them with classical cryptography .
  3. Utilizing the building blocks from mathematics to construct ciphers and algorithms, both symmetric and asymmetric, to achieve the basic goals of cryptography.
  4. Integrating cryptographic ciphers and algorithms to structure security protocols.
  5. Justify the operations of the cryptographic algorithms and protocols and verify them in practice, through experimentation with open-source libraries and tools.