Neha Mtech Thesis

download Neha Mtech Thesis

of 3

Transcript of Neha Mtech Thesis

  • 7/28/2019 Neha Mtech Thesis

    1/3

    lalit choudhary

    Mtech thesis4 messages

    lalit choudhary Mon, Jun 3, 2013 at 12:22 AM

    To: Neha Garg

    Mam,

    Please find attached Mtech thesis for the partial fulfillment

    of the degree along with Reference paper (ISO 27001 guidelines)

    which I have used as a major reference in the thesis.

    Please suggest me the changes if required in the same.

    I am very thankful to you.

    regards

    Shalu

    5 attachments

    Mtech_thesis_02-06-13.doc

    789K5_ISO27k_ISMS_Auditing_Guideline_release_1.rtf

    925K

    1_IJCSNSA_Study of Network Security Systems.pdf

    1436K

    3_IJCSNS_Comprehensive Network Security Approach.pdf

    884K

    4_IJCSNS_Implementation of Home Network Security System.pdf

    333K

    lalit choudhary Mon, Jun 3, 2013 at 12:23 AM

    To: lalit choudhary

    [Quoted text hidden]

    --

    Lalit Kr. Choudhary

    Engineer (EM-Design)

    THDC INDIA LTD.

    Rishikesh

    5 attachments

    ail - Mtech thesis https://mail.google.com/mail/?ui=2&ik=348212cb9e&view=pt&search...

    3 04-06-2013 11:48

  • 7/28/2019 Neha Mtech Thesis

    2/3

    Mtech_thesis_02-06-13.doc

    789K

    5_ISO27k_ISMS_Auditing_Guideline_release_1.rtf

    925K

    1_IJCSNSA_Study of Network Security Systems.pdf

    1436K

    3_IJCSNS_Comprehensive Network Security Approach.pdf884K

    4_IJCSNS_Implementation of Home Network Security System.pdf

    333K

    Neha Garg Tue, Jun 4, 2013 at

    9:45 AM

    To: lalit choudhary

    Dear Shalu,

    I have gone through the thesis that you have prepared and found certain points

    to be discussed and improved.

    Please go through these points and do the needful.

    1.References should be more atleast 25-30.

    2.References should be based on research paper which you have not even cited

    any where.

    3. Only guideline document(ISO) is referred everyhwere.4.Content,Abbreviations,List of of fig and tables are incomplete.

    5.Snapshots are very less in number,show the comparison snapshots of diff tools

    also.

    6.Main concern is what you have done(research innovation &

    implementation),this work might be already implemented.

    7.Add references to the figures also.

    8.References should be in IEEE format and uniform.

    9.You have taken an example(THDC) to elaborate your work ,but you are

    suppose to take a practical example which is not implemented yet and implementit for the same, that will be your actual dissertation,this is exactly copied and

    Thdc(or any organisation)does not have any security issues,any third person

    can scan their network, is it feasible, justify it and If asked are you able to

    implement the same for Graphic Era.

    10.Have added the sample data which you have taken in your thesis and what is

    the format of that.

    11.Are you able to justify your topic "Cost Effective Auditing of Web Applications

    And Networks in Small, Medium Business Enterprises ",where is web application

    auditing in your topic ,only THDC network is represented, as per my understanding.etc......

    Please do come some other day on time before 10 june 2013 according to your

    ail - Mtech thesis https://mail.google.com/mail/?ui=2&ik=348212cb9e&view=pt&search...

    3 04-06-2013 11:48

  • 7/28/2019 Neha Mtech Thesis

    3/3