Thursday

Ethical Hacking

 

UNIT I – Introduction and Footprinting.

  1. Define ethical hacking and explain its importance in cybersecurity.

  2. Explain the steps involved in ethical hacking with examples.

  3. What is footprinting? Differentiate between Internet footprinting and scanning.

  4. Explain the process of basic banner grabbing.

  5. Discuss the enumeration of common network services with examples.

  6. Describe the significance of network security monitoring.

  7. Explain how file and folder permissions can be secured in Windows.

  8. What is the encrypting file system (EFS) and how does it enhance security?

  9. Explain how enumeration helps in penetration testing.

  10. Discuss a case study on network security monitoring and securing permissions.


UNIT II – Dial-up, PBX, Voicemail, and VPN Hacking

  1. Describe the process of preparing for a dial-up connection in hacking scenarios.

  2. What is war-dialing? Explain its working with an example.

  3. Explain brute-force scripting in the context of password cracking.

  4. Discuss methods of voicemail hacking and their prevention.

  5. Explain VPN hacking techniques and countermeasures.

  6. How can network devices be discovered? Describe any two methods.

  7. Explain Autonomous System Lookup and its role in reconnaissance.

  8. Discuss the use of public newsgroups in gathering information for hacking.

  9. What is network vulnerability detection and why is it important?

  10. Explain how to detect Layer 2 media in a network.


UNIT III – Wireless Hacking and Firewalls

  1. Explain the concept of wireless footprinting and its purpose.

  2. Describe wireless scanning and enumeration techniques.

  3. Discuss how attackers gain unauthorized access to wireless networks.

  4. Explain tools used for exploiting WEP weaknesses.

  5. What is a Denial of Service (DoS) attack? Explain its motivations.

  6. List and explain the types of DoS attacks.

  7. Discuss firewall identification and techniques to scan through firewalls.

  8. Explain application proxy vulnerabilities in firewall systems.

  9. Compare UNIX and Windows-based DoS attacks.

  10. Explain packet filtering in firewalls with an example.


UNIT IV – Remote Control Insecurities and Malicious Programs

  1. Discuss methods to discover remote control software in a network.

  2. Explain weaknesses in VNC and their exploitation.

  3. Describe security issues in Microsoft Terminal Server and Citrix ICA.

  4. What is session hijacking? Explain any one advanced technique.

  5. Define backdoors and explain how they are used by attackers.

  6. Explain the working of Trojans and their impact on system security.

  7. Discuss preventive measures against session hijacking.

  8. How can administrators detect hidden backdoors in systems?

  9. Compare remote control insecurities between corporate and home networks.

  10. Explain any one real-world case study of Trojan attacks.


UNIT V – Cryptography, Social Engineering, and Web Hacking

  1. Explain the role of cryptography in ethical hacking.

  2. What is social engineering? Give examples of common attack techniques.

  3. Describe the process of subverting the system environment.

  4. Explain common methods of web server hacking.

  5. Discuss vulnerabilities in web applications and their exploitation.

  6. What is malicious mobile code? Give examples and preventive measures.

  7. Explain SSL fraud and its impact on secure communication.

  8. Describe methods of email hacking and possible defenses.

  9. Explain IRC hacking and its potential risks.

  10. Discuss global countermeasures to protect internet users from hacking.

Environment and Development

 

Week 1: Introduction

Topics: Development, economic growth and sustainable development, Basic ecosystem ecology

  1. Define economic growth and sustainable development. How are they related?

  2. Differentiate between development and economic growth with examples.

  3. Explain the concept of sustainable development in the context of environmental protection.

  4. Discuss the basic principles of ecosystem ecology.

  5. What are ecosystem components? Give examples.

  6. Explain the interrelationship between economy and environment.

  7. Discuss any three indicators of sustainable development.

  8. Explain the role of natural capital in economic growth.

  9. What is the difference between weak sustainability and strong sustainability?

  10. Discuss the importance of ecological balance for development.


Week 2: Environmentalism

Topics: Environmentalism, Environmental Movement, Environmentalism in the Global South

  1. Define environmentalism and explain its core objectives.

  2. Discuss any two major environmental movements in India.

  3. Explain the key characteristics of environmentalism in the Global South.

  4. Differentiate between environmentalism in developed and developing nations.

  5. How did the Chipko Movement influence environmental policies?

  6. Discuss the role of NGOs in promoting environmentalism.

  7. Explain how industrialization impacted environmental movements.

  8. What challenges does environmentalism face in the Global South?

  9. Discuss the importance of grassroots participation in environmental movements.

  10. Write a short note on the Silent Valley Movement.


Week 3: Approaches to Environment

Topics: Ecofeminism, Feminist political ecology, Marxism and ecology

  1. Define ecofeminism and explain its principles.

  2. How does ecofeminism link gender and environmental issues?

  3. Explain the concept of feminist political ecology.

  4. Discuss the contribution of feminist political ecology to environmental policy.

  5. Explain the Marxist view of ecology.

  6. How does Marxism explain environmental degradation?

  7. Compare ecofeminism and Marxist ecology approaches.

  8. Discuss the role of women in environmental protection from an ecofeminist perspective.

  9. Explain how capitalist production systems affect ecology.

  10. Critically evaluate the strengths and limitations of Marxist ecology.


Week 4: Environmental Ethics

Topics: Deep ecology, Gandhi and ecology, Social ecology

  1. Define deep ecology and explain its philosophy.

  2. Compare deep ecology and shallow ecology.

  3. Explain Gandhi’s principles related to ecology.

  4. How does Gandhian thought support sustainable living?

  5. Explain the concept of social ecology.

  6. Discuss the relationship between social structures and environmental problems.

  7. Compare deep ecology and social ecology.

  8. How does social ecology address environmental justice?

  9. Explain the ethical basis of deep ecology.

  10. Discuss any one example of Gandhian environmental practices.


Week 5: Religion, Environment and Conservation

Topics: Religion, historical roots of ecological crisis, biodiversity ethics in Buddhism & Hinduism, Christian religion & ecological crisis

  1. Explain the relationship between religion and environmental conservation.

  2. Discuss the historical roots of the ecological crisis.

  3. Explain biodiversity conservation ethics in Buddhism.

  4. How does Hinduism promote biodiversity conservation?

  5. Discuss the role of sacred groves in biodiversity conservation.

  6. Explain Christian perspectives on the ecological crisis.

  7. Compare biodiversity ethics in Hinduism and Buddhism.

  8. How have religious teachings influenced environmental protection?

  9. Discuss the role of spirituality in ecological conservation.

  10. Give examples of religious rituals promoting conservation.


Week 6: Natural Resource Management

Topics: Common property vs. private property, livelihoods, forests, and conservation

  1. Differentiate between common property and private property resources.

  2. Explain the concept of common-pool resource management.

  3. How do property rights influence resource conservation?

  4. Discuss the role of forests in rural livelihoods.

  5. Explain the link between forests and biodiversity conservation.

  6. Discuss challenges in managing common property resources.

  7. Explain the concept of community-based forest management.

  8. How does privatization affect natural resource sustainability?

  9. Discuss examples of successful common property management in India.

  10. Explain the role of local communities in forest conservation.


Week 7: Displacement, Dispossession and Development

Topics: Conservation-induced displacement, EIA, land acquisition

  1. Define conservation-induced displacement and give examples.

  2. Discuss social impacts of displacement due to conservation projects.

  3. Explain the role of Environmental Impact Assessment (EIA) in development projects.

  4. Describe the objectives of the National Rehabilitation and Resettlement Policy.

  5. Discuss the challenges in implementing resettlement policies.

  6. Explain the concept of dispossession in the context of land acquisition.

  7. How does land acquisition affect indigenous communities?

  8. Discuss case studies of displacement due to large dams.

  9. Explain legal safeguards for displaced populations.

  10. Suggest measures to reduce displacement impacts.


Week 8: Mainstream Development and Indigenous Peoples

Topics: Mining, competing visions, dams & resistance

  1. Discuss the impact of mining on indigenous communities.

  2. Explain competing visions of development along the Narmada River.

  3. How do large dams affect indigenous livelihoods?

  4. Discuss resistance movements against dam construction.

  5. Explain the environmental impacts of mining.

  6. Discuss the role of public consultation in development projects.

  7. Explain the trade-off between economic growth and indigenous rights.

  8. Describe any case study of resistance to development projects.

  9. Discuss how development can strengthen indigenous communities.

  10. Suggest measures for sustainable mining.


Week 9: Gender and Development

Topics: Gendered approach, sustainable development

  1. Explain the gendered approach to development.

  2. How does gender inequality affect development outcomes?

  3. Discuss the role of women in sustainable development.

  4. Explain how environmental degradation affects women differently.

  5. Discuss policies that integrate gender in development planning.

  6. How does gender mainstreaming benefit environmental policies?

  7. Explain the concept of Women, Environment, and Development (WED).

  8. Discuss the role of women in natural resource management.

  9. Explain the link between gender equity and poverty reduction.

  10. Give examples of women-led environmental initiatives.


Week 10: Environment and Climate Change

Topics: Climate change policy, Eastern Himalayas

  1. Explain the major causes of climate change.

  2. Discuss national policies for climate change mitigation.

  3. Explain adaptation strategies for climate change.

  4. Discuss the impact of climate change on the Eastern Himalayas.

  5. How does climate change affect biodiversity?

  6. Explain India’s role in international climate change negotiations.

  7. Discuss renewable energy as a climate change mitigation tool.

  8. Explain community-based climate change adaptation.

  9. Discuss challenges in implementing climate policies.

  10. Explain the role of afforestation in climate change mitigation.


Week 11: Belief & Knowledge Systems

Topics: Ecological knowledge, biodiversity conservation, traditional religion in NE India

  1. Explain the concept of ecological knowledge.

  2. Discuss the role of traditional ecological knowledge in conservation.

  3. How does biodiversity conservation support sustainability?

  4. Explain the contribution of traditional religion to nature conservation in Northeast India.

  5. Discuss case studies of community-led biodiversity conservation.

  6. Compare scientific and traditional ecological knowledge systems.

  7. Explain the importance of sacred landscapes in conservation.

  8. Discuss challenges in preserving indigenous ecological knowledge.

  9. Explain the role of cultural beliefs in biodiversity protection.

  10. Discuss how ecological knowledge can be integrated into modern policy.


Week 12: Local Knowledge in Environment-Development Discourse

Topics: Indigenous knowledge, relevance, case studies

  1. Define indigenous knowledge and its characteristics.

  2. Discuss the role of indigenous knowledge in sustainable development.

  3. Explain how indigenous knowledge contributes to environmental management.

  4. Give examples of indigenous practices in agriculture and forestry.

  5. Discuss case studies where indigenous knowledge helped solve environmental problems.

  6. Compare indigenous and scientific knowledge approaches.

  7. Explain challenges in preserving indigenous knowledge.

  8. Discuss the role of education in promoting indigenous knowledge.

  9. How can policymakers integrate indigenous knowledge into development planning?

  10. Explain the importance of documenting indigenous knowledge for future generations.

Indian Knowledge System (IKS) – Concepts and Applications in Engineering

 

Week 1: Indian Knowledge System – An Introduction

  1. Define Indian Knowledge System (IKS) and explain its significance.

  2. Why is it necessary to integrate IKS into modern education?

  3. Explain the organization and structure of the Indian Knowledge System.

  4. Describe the historical evolution of IKS with suitable examples.

  5. Discuss any four salient aspects of the Indian Knowledge System.

  6. Compare IKS with Western knowledge systems in terms of objectives and methodology.

  7. How has IKS influenced the development of science and technology in India?

  8. Write short notes on the interdisciplinary nature of IKS.

  9. Explain the relevance of IKS in solving modern engineering problems.

  10. Discuss the role of IKS in sustainable development.


Week 2: The Vedic Corpus

  1. Describe the structure and purpose of the four Vedas.

  2. Explain the sub-classification of Vedas with examples.

  3. What are the main messages conveyed in the Vedas?

  4. Write short notes on Vedāṅgas and their importance.

  5. Explain Śikṣā and Vyākaraṇa as branches of Vedāṅgas.

  6. What is Nirukta? How does it help in understanding ancient texts?

  7. Discuss the significance of Chandas in Vedic literature.

  8. Explain the role of Kalpa in the Vedic system.

  9. What is Jyotiṣa and why was it important in Vedic life?

  10. Discuss any three distinctive features of Vedic life.


Week 3: Number Systems and Units of Measurement

  1. Explain the historical evidence of number systems in ancient India.

  2. Discuss salient aspects of Indian mathematics.

  3. Describe the Bhūta-Saṃkhyā system with examples.

  4. Explain the Kaṭapayādi system of numerical representation.

  5. How were measurements for time, distance, and weight standardized in ancient India?

  6. Describe Piṅgala’s contribution to the binary system.

  7. Compare the Indian number system with the modern decimal system.

  8. Discuss the application of ancient Indian measurement systems in architecture.

  9. Write a note on ancient astronomical time measurement.

  10. How did Indian mathematicians ensure precision in measurements?


Week 4: Mathematics

  1. Explain the unique aspects of Indian mathematics.

  2. Describe contributions of any two Indian mathematicians in detail.

  3. Discuss the development of algebra in ancient India.

  4. How was geometry applied in temple construction?

  5. Describe the evolution of trigonometry in Indian mathematics.

  6. Explain binary mathematics in Chandaḥ Śāstra.

  7. Discuss the role of combinatorics in ancient Indian mathematics.

  8. Write short notes on magic squares in India.

  9. Compare Indian algebraic methods with Greek methods.

  10. Explain how Indian mathematical concepts influenced other civilizations.


Week 5: Astronomy

  1. Outline the main contributions of ancient India to astronomy.

  2. Explain the celestial coordinate system used in Indian astronomy.

  3. Describe the elements of the Indian calendar system.

  4. What is the concept of years and months in Indian astronomy?

  5. Explain the components of a Pañcāṅga.

  6. Describe any two astronomical instruments used in ancient India.

  7. Discuss the significance of Jantar Mantar in astronomical studies.

  8. Compare Indian astronomical methods with modern techniques.

  9. Explain the role of astronomy in agricultural planning in ancient India.

  10. How did astronomical observations influence Indian festivals?


Week 6: Engineering & Technology – Metals and Metalworking

  1. Explain the historical significance of Wootz steel.

  2. Discuss the heritage of Indian science and technology.

  3. Describe ancient mining and ore extraction techniques.

  4. Write a note on metals and metalworking technology in India.

  5. Explain the evolution of iron and steel production in India.

  6. Describe the lost wax casting process.

  7. Explain apparatuses used for metallic component extraction.

  8. Compare ancient and modern metallurgical processes.

  9. Discuss the role of metallurgy in Indian weapon making.

  10. How did metalworking influence trade in ancient India?


Week 7: Engineering & Technology – Other Applications

  1. Explain ancient irrigation systems in South India.

  2. Describe the role of literary sources in understanding science and technology.

  3. Discuss major physical structures in ancient India.

  4. Explain water management techniques in Indian civilization.

  5. Describe ancient dye and painting technology.

  6. Write a note on perfume-making in India.

  7. Explain surgical techniques from ancient Indian texts.

  8. Discuss the shipbuilding tradition in India.

  9. What are the sixty-four art forms (64 Kalās)? Give examples.

  10. Explain the status of indigenous S&T during colonial rule.


Week 8: Town Planning and Architecture

  1. Describe town planning principles in Arthaśāstra.

  2. What is Vāstu-śāstra? Explain its importance.

  3. List and explain the eight limbs of Vāstu.

  4. Discuss ancient Indian approaches to urban planning.

  5. Explain the engineering aspects of temple construction.

  6. Compare Nagara and Dravidian temple architecture.

  7. What is iconography? Give examples from Indian temples.

  8. Explain how climate influenced ancient Indian architecture.

  9. Describe water storage structures in ancient towns.

  10. How did town planning promote sustainability in ancient India?


Week 9: Knowledge Framework and Classifications

  1. Explain the Indian scheme of knowledge.

  2. Describe the knowledge triangle.

  3. What is Prameya? Explain with examples.

  4. Explain Dravyas as constituents of physical reality.

  5. Describe attributes and actions in Vaiśeṣika philosophy.

  6. Explain Sāmānya, Viśeṣa, and Samavāya with examples.

  7. What is Pramāṇa? Discuss its types.

  8. Explain the concept of Saṃśaya in knowledge systems.

  9. Outline the framework for establishing valid knowledge.

  10. Differentiate between deductive and inductive logic.

  11. Give examples of potential fallacies in reasoning.

  12. Explain Siddhānta with examples.


Week 10: Linguistics

  1. Explain the significance of Aṣṭādhyāyī in Sanskrit grammar.

  2. Describe the role of phonetics in linguistics.

  3. Explain the process of word generation in Sanskrit.

  4. Discuss computational aspects of ancient linguistic systems.

  5. How were mnemonics used in preserving knowledge?

  6. Explain recursive operations in Panini’s grammar.

  7. Describe rule-based operations in Sanskrit linguistics.

  8. Explain sentence formation rules in Sanskrit.

  9. Describe the role of verbs and prefixes in word meaning.

  10. Explain how Sanskrit contributes to natural language processing.

Tuesday

ADVANCED DATABASE SECURITY

 ADVANCED DATABASE SECURITY

(MTCSPE3001A)

Assignment Questions

UNIT I: Database Basics & SQL

Bloom Level 3 – Apply

1. Apply the concept of data abstraction by giving real-life examples of each level.

2. Write a SQL query to display names and salaries of employees earning more than ₹50,000.

3. Draw an ER diagram for a library management system.

4. Demonstrate the process of converting an ER model into a relational schema.

5. Formulate a SQL query to fetch customer details who have placed orders in the last 30 days.

Bloom Level 4 – Analyze

6. Analyze the differences between a schema and an instance with suitable examples.

7. Differentiate between logical and physical data independence with examples.

8. Compare ER model and Relational model in terms of data representation and usage.

9. Given a SQL query, identify and explain its components (SELECT, FROM, WHERE).

10. Analyze a poorly structured SQL query and suggest improvements.

Bloom Level 5 – Evaluate

11. Evaluate the effectiveness of SQL in querying large databases.

12. Critically assess the limitations of the ER model in representing complex relationships.

13. Justify the use of relational databases over file systems with examples.

14. Assess how data abstraction improves database performance and usability.

15. Evaluate SQL’s role in enforcing data integrity.

UNIT II: Introduction to Database Security

Bloom Level 3 – Apply

1. Apply access control concepts to a hospital database system.

2. Demonstrate how cryptographic techniques secure data in transit and at rest.

3. Illustrate the structure of a statistical database and its use in government data.

4. Apply SQL GRANT and REVOKE commands to manage access.

5. Create an access control list (ACL) for a university student portal.

Bloom Level 4 – Analyze

6. Analyze various types of security threats databases face.

7. Compare discretionary access control and mandatory access control with examples.

8. Analyze how cryptographic data protection differs from access control.

9. Examine how SQL handles security features like roles and permissions.

10. Compare the advantages and limitations of statistical databases.

Bloom Level 5 – Evaluate

11. Evaluate the role of databases in supporting organizational security policies.

12. Judge the effectiveness of cryptographic data protection in preventing data breaches.

13. Evaluate the importance of SQL security features in multi-user systems.

14. Critically examine the trade-offs between performance and security in database systems.

15. Justify the need for security mechanisms even in isolated database systems.

UNIT III: Security Methods and Techniques

Bloom Level 3 – Apply

1. Demonstrate how to use SQL views to limit data exposure.

2. Apply data masking to protect sensitive information in a database.

3. Write SQL triggers to track unauthorized modifications.

4. Illustrate row-level security using example SQL commands.

5. Use escaping techniques to prevent SQL injection in user input.

Bloom Level 4 – Analyze

6. Analyze the role of triggers in enhancing security.

7. Compare column-level and row-level access control with examples.

8. Examine the effectiveness of change tracking for detecting unauthorized access.

9. Distinguish between symmetric and asymmetric encryption in databases.

10. Analyze how views can support security while ensuring data usability.

Bloom Level 5 – Evaluate

11. Evaluate different access control models in the context of database security.

12. Assess the use of data masking in protecting personally identifiable information (PII).

13. Judge the impact of encryption on database performance and security.

14. Justify the need for query escaping in web applications.

15. Evaluate change tracking tools as part of a database audit mechanism.

UNIT IV: Data Integrity & Backup

Bloom Level 3 – Apply

1. Apply referential integrity rules to a banking database.

2. Demonstrate how to perform a full database backup using SQL tools.

3. Illustrate how domain integrity constraints ensure data validity.

4. Use SQL commands to enforce table-level constraints.

5. Show how to configure monitoring tools to track user activity.

Bloom Level 4 – Analyze

6. Analyze how different types of integrity constraints ensure data consistency.

7. Compare integrity constraints and triggers in terms of their roles.

8. Examine how backup strategies differ for small and large databases.

9. Analyze the importance of transaction logs in backup and recovery.

10. Distinguish between logical and physical database backups.

Bloom Level 5 – Evaluate

11. Evaluate the effectiveness of built-in database integrity features.

12. Judge the role of regular backups in disaster recovery planning.

13. Assess the reliability of database monitoring tools in detecting suspicious activity.

14. Critically evaluate whether constraints limit or enhance database performance.

15. Justify the use of foreign keys in maintaining relational integrity.

UNIT V: Security Analysis Tools

Bloom Level 3 – Apply

1. Apply penetration testing methods on a test database.

2. Demonstrate how a SQL injection attack works with a basic example.

3. Use a database security scanner to identify vulnerabilities.

4. Illustrate how to write a simple script to detect weak passwords in a database.

5. Apply input validation techniques to prevent SQL injection.

Bloom Level 4 – Analyze

6. Analyze the causes and consequences of SQL injection attacks.

7. Compare manual vs automated database security analysis.

8. Examine the working of a popular open-source database security scanner.

9. Distinguish between false positives and true threats in vulnerability reports.

10. Analyze how security misconfigurations contribute to database breaches.

Bloom Level 5 – Evaluate

11. Evaluate different tools used for database security analysis.

12. Judge the adequacy of SQL injection prevention techniques.

13. Critically assess the benefits and limitations of writing custom security tools.

14. Evaluate how regular audits can improve database security posture.

15. Justify the need for continuous monitoring even after initial hardening.

Friday

Social Network Analysis

 

1: Introduction & Tools

  1. Define social network analysis and explain its importance in real-world systems.

  2. Describe the basic components of a graph. How are these used in network modeling?

  3. Explain the differences between directed and undirected networks with suitable examples.

  4. Write a Python snippet using NetworkX to create and visualize a simple graph.

  5. Describe the main features and uses of Google Colab for social network analysis tasks.


 2: Network Measures

  1. Define degree centrality and closeness centrality. How do they differ in interpretation?

  2. What is betweenness centrality? Explain its significance in identifying bridge nodes.

  3. Describe clustering coefficient. What does a high clustering coefficient imply?

  4. Explain the concept of average path length in a network.

  5. Write a Python code using NetworkX to compute degree centrality and plot it.


3: Network Growth Models

  1. Compare and contrast the Erdős–Rényi model and Barabási–Albert model.

  2. Explain the concept of preferential attachment in network evolution.

  3. How do random graphs help in understanding real-world network structures?

  4. What are small-world networks? Explain with the help of the Watts–Strogatz model.

  5. Describe the steps to generate a scale-free network using NetworkX.


 4: Link Analysis

  1. Describe the PageRank algorithm and its applications.

  2. What is the HITS algorithm? How does it differ from PageRank?

  3. Explain the concepts of hub and authority scores.

  4. How does link analysis help in ranking web pages?

  5. Illustrate with code how to compute PageRank of a graph in NetworkX.


 5: Graph Visualization & Community Detection I

  1. Why is graph visualization important in network analysis?

  2. Discuss different layout algorithms available for visualizing graphs.

  3. What are communities in a network? Give real-world examples.

  4. Explain the Girvan–Newman algorithm for community detection.

  5. Demonstrate a visualization of communities using NetworkX and matplotlib.


 6: Community Detection II

  1. What is modularity? How does it help in evaluating community structures?

  2. Explain the Louvain method for community detection.

  3. Compare the Girvan–Newman and Louvain algorithms in terms of accuracy and efficiency.

  4. How can overlapping communities be identified in a network?

  5. Write code to detect communities in a graph and calculate modularity using NetworkX.


7: Link Prediction

  1. What is link prediction and why is it important in social networks?

  2. Describe common similarity-based methods for link prediction.

  3. Explain how machine learning can be applied to the link prediction problem.

  4. Describe and compare Jaccard Coefficient and Adamic-Adar Index.

  5. Implement a simple link prediction model using NetworkX.


 8: Cascade Behavior and Network Effects

  1. Explain the concept of information cascade with an example.

  2. How does the threshold model of behavior adoption work in networks?

  3. What are network externalities? How do they affect user behavior?

  4. Describe diffusion models used in analyzing cascade behaviors.

  5. Simulate a simple cascade process using a Python script.


9: Anomaly Detection

  1. What constitutes an anomaly in a network?

  2. Explain how network topology can help detect anomalous nodes or links.

  3. Discuss different types of anomalies (e.g., structural, temporal).

  4. Describe a method to detect fraud in e-commerce networks.

  5. Write a Python function to identify nodes with unusual degree distributions.


10: Intro to Deep Learning & Graph Representation I

  1. What are the challenges in applying deep learning to graphs?

  2. Define graph embeddings and explain their purpose.

  3. Describe the concept of node2vec and how it captures network features.

  4. How does graph structure differ from regular data in DL applications?

  5. Illustrate how to convert a graph into a format usable by deep learning models.


11: Graph Representation II

  1. Explain Graph Convolutional Networks (GCNs) and their working principles.

  2. How is information propagated in GCNs?

  3. Describe one practical use case of Graph Neural Networks.

  4. What are the limitations of shallow embedding methods like DeepWalk?

  5. Implement a basic graph representation learning model using node2vec.


12: Applications & Case Studies

  1. Describe a real-world application where social network analysis improved outcomes.

  2. How can network science help in analyzing fake news spread?

  3. Discuss a case study involving anomaly detection in financial transaction networks.

  4. Explain the role of SNA in recommendation systems.

  5. Summarize key learnings from the course and their practical significance.

Thursday

Strategic Management

 

1: Introduction to Strategic Management

  1. Explain the significance of strategic management in achieving organizational goals.

  2. Discuss the steps involved in the strategic management process with examples.

  3. Analyze how the liberalization of the Indian economy in 1991 impacted corporate strategy.

  4. Compare corporate strategy with business and functional strategies.

  5. Illustrate with examples how strategic management leads to competitive advantage.


2: Board of Directors and Top Management

  1. Describe the structure and key functions of the Board of Directors in a corporate setting.

  2. Explain the strategic role played by top management in shaping the vision of a company.

  3. Discuss corporate governance and its influence on strategic decision-making.

  4. Analyze the challenges faced by Boards in the Indian context while performing their duties.

  5. What skills should top executives possess to ensure effective strategic planning?


 3: Environmental and Internal Scanning

  1. Explain the purpose and process of environmental scanning in strategic planning.

  2. Differentiate between EFAS and IFAS with suitable examples.

  3. How does industry analysis help in identifying strategic opportunities and threats?

  4. Describe the value chain model and its application in internal analysis.

  5. Using a hypothetical case, explain how to synthesize internal and external factors.


4: Strategy Formulation

  1. Explain the process of preparing a Strategic Factors Analysis Summary (SFAS).

  2. Distinguish between corporate-level strategy and business-level strategy with examples.

  3. Evaluate how strategic alternatives are assessed and selected in organizations.

  4. Describe the role of functional strategies in the overall strategic framework.

  5. How do internal and external factors influence strategic choice?


5: Strategy Implementation

  1. Explain how organization structure supports or hinders strategy implementation.

  2. Discuss the impact of corporate culture on successful strategy execution.

  3. Analyze diversification strategies using real-world company examples.

  4. Explain how mergers and acquisitions contribute to strategic growth.

  5. Identify and explain key challenges in implementing corporate strategies effectively.


6: Evaluation and Control

  1. Describe the steps involved in evaluating strategic performance.

  2. How does the Balanced Scorecard help in monitoring and controlling strategy?

  3. Discuss the role of feedback mechanisms in strategic control systems.

  4. Analyze the benefits of using Strategic Information Systems for performance evaluation.

  5. Provide a framework for measuring the success of a newly implemented strategy.


7: Strategic Enablers – R&D, IT

  1. Explain the strategic significance of R&D in innovation-driven industries.

  2. How does IT support strategic decision-making and competitive positioning?

  3. Analyze the integration of IT strategy with business strategy using an industry example.

  4. Discuss the challenges of managing R&D as a strategic function.

  5. Evaluate the role of digital transformation in reshaping strategic planning.


8: KM, Technology, Strategic Risk

  1. Explain the process of Knowledge Management and its strategic importance.

  2. Discuss the types of strategic risks faced by global businesses today.

  3. How can organizations build resilience against strategic risks?

  4. Analyze the role of emerging technologies in transforming strategic capabilities.

  5. Discuss how KM supports continuous improvement and innovation in strategy.


More Questions 

1: Introduction to Strategic Management

  1. Define strategic management. How does it differ from operational management?

  2. Explain the key elements of the strategic management process.

  3. What is the significance of corporate strategy in an organization?

  4. Discuss the role of vision and mission statements in strategy formulation.

  5. How does strategic management provide a competitive edge in a liberalized economy?


2: Board of Directors and Top Management

  1. What are the primary roles and responsibilities of the Board of Directors?

  2. How does top management influence strategic decision-making?

  3. Explain the importance of corporate governance in strategic management.

  4. Compare and contrast board functioning in Indian companies versus global practices.

  5. What are the essential skills required by top executives for effective strategic leadership?


 3: Environmental and Internal Scanning

  1. What is environmental scanning and why is it important for strategy formulation?

  2. Describe the components of the external environment in strategic analysis.

  3. How is the EFAS (External Factors Analysis Summary) prepared?

  4. Explain the concept of value chain analysis and its strategic significance.

  5. Discuss how internal factors are analyzed using IFAS (Internal Factors Analysis Summary).


 4: Strategy Formulation

  1. What is SFAS (Strategic Factors Analysis Summary) and how is it derived?

  2. Differentiate between business-level and corporate-level strategies.

  3. Explain the process of choosing an appropriate strategic alternative.

  4. Describe the role of functional strategy in supporting business strategy.

  5. What factors should be considered while making strategic choices?


5: Strategy Implementation

  1. How does organizational structure affect strategy implementation?

  2. What is the relationship between corporate culture and strategy execution?

  3. Discuss the strategic rationale behind mergers and acquisitions.

  4. Explain how diversification can be used as a strategic tool.

  5. Identify key barriers to successful strategy implementation.


 6: Evaluation and Control

  1. What are the key steps in strategic evaluation?

  2. Explain the role of feedback in strategic control systems.

  3. Describe the concept of Balanced Scorecard and its application in strategy control.

  4. How can Strategic Information Systems support evaluation and control?

  5. Discuss how companies can measure the effectiveness of their strategies.


 7: R&D and IT as Strategic Enablers

  1. How does R&D contribute to sustaining competitive advantage?

  2. Discuss the strategic role of Information Technology in modern organizations.

  3. Explain the interlinkages between innovation, R&D, and strategy.

  4. What challenges do firms face while integrating IT with business strategy?

  5. How can R&D and IT be aligned with long-term corporate objectives?


8: Knowledge Management, Technology & Strategic Risk

  1. Define Knowledge Management and its relevance in strategic management.

  2. Discuss how technology acts as a driver of strategic change.

  3. What are the different types of strategic risk organizations face today?

  4. Explain how companies can proactively manage strategic risks.

  5. How does KM enhance organizational learning and decision-making?

DATA PRIVACY Syllabus

 DATA PRIVACY MTCSPE1001D

Course objectives:

1. To create architectural, algorithmic and technological foundations for the maintenance of the privacy of individuals, the confidentiality of organizations, and the protection of sensitive information, despite the requirement that information be released publicly or semi-publicly.

Course outcomes: After successful completion of this course, students will be able to:

1. Understand the concepts of privacy in today’s environment.

2. Obtain the understanding of how automation is changing the concepts and expectations concerning privacy and the increasingly interconnected issue of security.

3. Obtain the knowledge of the role of private regulatory and self-help efforts.

4. Have an understanding of how emerging issues are affecting society and business, with a concentration on how information security must shape corporate practices.

Course Contents: 

UNIT I

Introduction- Fundamental Concepts, Definitions, Statistics, Data Privacy Attacks, Data linking and profiling, access control models, role-based access control, privacy policies, their specifications, languages and implementation, privacy policy languages, privacy in different domains- medical, financial, etc. 

UNIT II

Data explosion- Statistics and Lack of barriers in Collection and Distribution of Person- specific information. Mathematical model for characterizing and comparing real-world data sharing practices and policies and for computing privacy and risk measurements, Demographics and Uniqueness.

UNIT III

Protection Models- Null-map, k-map, Wrong map Survey of techniques- Protection models (null-map, k-map, wrong map), Disclosure control, Inferring entity identities, Strength and weaknesses of techniques, entry specific databases. Computation systems for protecting delimited data- MinGen, Datafly, Mu-Argus, k-Similar, Protecting textual documents: Scrub. 

UNIT IV

Technology, Policy, Privacy and Freedom- Medical privacy legislation, policies and best practices 

UNIT V

Examination of privacy matters specific to the World Wide Web, Protections provided by the Freedom of Information Act or the requirement for search warrants.


References:

1. B. Raghunathan, The Complete Book of Data Anonymization: From Planning to Implementation, Auerbach Pub, 2013.

2. L. Sweeney, Computational Disclosure Control: A Primer on Data Privacy Protection, MIT Computer Science, 2002.