0% found this document useful (0 votes)
96 views1 page

Cyber Security Tutorial Sheet

This document provides a tutorial sheet for a Cyber Security course. It lists 10 questions to be answered related to PKI, digital certificates, certifying authorities, digital signatures, and encryption algorithms. Students are provided reading materials from 3 textbooks and 3 reference books to assist in answering the questions. The document specifies the class, semester, subject code, name, credits, and asks students to note the date it is assigned, received, and returned after being evaluated.

Uploaded by

Sanchit Thakur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views1 page

Cyber Security Tutorial Sheet

This document provides a tutorial sheet for a Cyber Security course. It lists 10 questions to be answered related to PKI, digital certificates, certifying authorities, digital signatures, and encryption algorithms. Students are provided reading materials from 3 textbooks and 3 reference books to assist in answering the questions. The document specifies the class, semester, subject code, name, credits, and asks students to note the date it is assigned, received, and returned after being evaluated.

Uploaded by

Sanchit Thakur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

M. M. Institute of Computer Technology & Business Management, M.M.

Tutorial Sheet 7
(Deemed to be University), Mullana
Session : 2022-23 (Even Class/Semester : BCA – 6th
Semester)
Subject Code: BCA-603 Subject Name : Cyber Security
Lecture : 3 Tutorial : 1
Max. Marks Theory: 60 Max. Marks Sessional : 40 Credits : 4.0
Assigned on: Received on : Evaluated & Returned
on :
Section Question No. Question Marks Remarks
1. What is the purpose of PKI? 1
2. Define DSC? What are the types of Certificates 1
issued by CAs?

3. What does X.509 refer to as it relates to digital 1


certificates?

4. Diffrentiate between one-time signature 1


scheme and undeniable signature scheme.
A 5. Differentiate between electronic Signature and 2
Digital Signature.
6. How Are Certifying Authorities Susceptible of 2
Attack?

7. What is the Certificate Revocation List (CRL)? 2

8. Diffrentiate between Needham Schriroeder & 4


Kerberos algorithm.
9. Discuss X.509 Certificate? 4
10. Explain PKI. 6
`
Text Books:
1. Mark S Merkow and Jim Breithaupt, Information Security Principles and Practices, Prentice
Hall, 2nd Ed, 2016
2. Nina Godbole and Sunit Belapure, Cyber Security Understanding cyber Crime, Computer
Forensics and Legal Perspectives, Willey Publication, 1st ed., 2011.
3. Pavan Duggal, Ransomware and Cyber Law, Saakshar Law Publications, 2009

Reference Books:
1. Bill Nelson, Amelia Phillips and Christopher Steuart, Guide to Computer Forensics and
Investigations, Cengage Learning, 5th ed., 2014.
2. Bernadette H Schell and Clemens Martin, Cybercrime, ABC – CLIO, 1st ed., 2004.
3. Michael E. Whitman and Herbert J. Mattord, Principles of Information Security with
MindTap, Cengage Publications, 6th ed., 2018.

You might also like