M. M. Institute of Computer Technology & Business Management, M.M.
Tutorial Sheet 7
(Deemed to be University), Mullana
Session : 2022-23 (Even Class/Semester : BCA – 6th
Semester)
Subject Code: BCA-603 Subject Name : Cyber Security
Lecture : 3 Tutorial : 1
Max. Marks Theory: 60 Max. Marks Sessional : 40 Credits : 4.0
Assigned on: Received on : Evaluated & Returned
on :
Section Question No. Question Marks Remarks
1. What is the purpose of PKI? 1
2. Define DSC? What are the types of Certificates 1
issued by CAs?
3. What does X.509 refer to as it relates to digital 1
certificates?
4. Diffrentiate between one-time signature 1
scheme and undeniable signature scheme.
A 5. Differentiate between electronic Signature and 2
Digital Signature.
6. How Are Certifying Authorities Susceptible of 2
Attack?
7. What is the Certificate Revocation List (CRL)? 2
8. Diffrentiate between Needham Schriroeder & 4
Kerberos algorithm.
9. Discuss X.509 Certificate? 4
10. Explain PKI. 6
`
Text Books:
1. Mark S Merkow and Jim Breithaupt, Information Security Principles and Practices, Prentice
Hall, 2nd Ed, 2016
2. Nina Godbole and Sunit Belapure, Cyber Security Understanding cyber Crime, Computer
Forensics and Legal Perspectives, Willey Publication, 1st ed., 2011.
3. Pavan Duggal, Ransomware and Cyber Law, Saakshar Law Publications, 2009
Reference Books:
1. Bill Nelson, Amelia Phillips and Christopher Steuart, Guide to Computer Forensics and
Investigations, Cengage Learning, 5th ed., 2014.
2. Bernadette H Schell and Clemens Martin, Cybercrime, ABC – CLIO, 1st ed., 2004.
3. Michael E. Whitman and Herbert J. Mattord, Principles of Information Security with
MindTap, Cengage Publications, 6th ed., 2018.