Neha Mtech Thesis
-
Upload
lalit-choudhary -
Category
Documents
-
view
219 -
download
0
Transcript of Neha Mtech Thesis
-
7/28/2019 Neha Mtech Thesis
1/3
lalit choudhary
Mtech thesis4 messages
lalit choudhary Mon, Jun 3, 2013 at 12:22 AM
To: Neha Garg
Mam,
Please find attached Mtech thesis for the partial fulfillment
of the degree along with Reference paper (ISO 27001 guidelines)
which I have used as a major reference in the thesis.
Please suggest me the changes if required in the same.
I am very thankful to you.
regards
Shalu
5 attachments
Mtech_thesis_02-06-13.doc
789K5_ISO27k_ISMS_Auditing_Guideline_release_1.rtf
925K
1_IJCSNSA_Study of Network Security Systems.pdf
1436K
3_IJCSNS_Comprehensive Network Security Approach.pdf
884K
4_IJCSNS_Implementation of Home Network Security System.pdf
333K
lalit choudhary Mon, Jun 3, 2013 at 12:23 AM
To: lalit choudhary
[Quoted text hidden]
--
Lalit Kr. Choudhary
Engineer (EM-Design)
THDC INDIA LTD.
Rishikesh
5 attachments
ail - Mtech thesis https://mail.google.com/mail/?ui=2&ik=348212cb9e&view=pt&search...
3 04-06-2013 11:48
-
7/28/2019 Neha Mtech Thesis
2/3
Mtech_thesis_02-06-13.doc
789K
5_ISO27k_ISMS_Auditing_Guideline_release_1.rtf
925K
1_IJCSNSA_Study of Network Security Systems.pdf
1436K
3_IJCSNS_Comprehensive Network Security Approach.pdf884K
4_IJCSNS_Implementation of Home Network Security System.pdf
333K
Neha Garg Tue, Jun 4, 2013 at
9:45 AM
To: lalit choudhary
Dear Shalu,
I have gone through the thesis that you have prepared and found certain points
to be discussed and improved.
Please go through these points and do the needful.
1.References should be more atleast 25-30.
2.References should be based on research paper which you have not even cited
any where.
3. Only guideline document(ISO) is referred everyhwere.4.Content,Abbreviations,List of of fig and tables are incomplete.
5.Snapshots are very less in number,show the comparison snapshots of diff tools
also.
6.Main concern is what you have done(research innovation &
implementation),this work might be already implemented.
7.Add references to the figures also.
8.References should be in IEEE format and uniform.
9.You have taken an example(THDC) to elaborate your work ,but you are
suppose to take a practical example which is not implemented yet and implementit for the same, that will be your actual dissertation,this is exactly copied and
Thdc(or any organisation)does not have any security issues,any third person
can scan their network, is it feasible, justify it and If asked are you able to
implement the same for Graphic Era.
10.Have added the sample data which you have taken in your thesis and what is
the format of that.
11.Are you able to justify your topic "Cost Effective Auditing of Web Applications
And Networks in Small, Medium Business Enterprises ",where is web application
auditing in your topic ,only THDC network is represented, as per my understanding.etc......
Please do come some other day on time before 10 june 2013 according to your
ail - Mtech thesis https://mail.google.com/mail/?ui=2&ik=348212cb9e&view=pt&search...
3 04-06-2013 11:48
-
7/28/2019 Neha Mtech Thesis
3/3