[go: up one dir, main page]

0% found this document useful (0 votes)
4 views1 page

Assignment 3

Uploaded by

Aqib khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views1 page

Assignment 3

Uploaded by

Aqib khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

University of Engineering and Technology, Taxila

Information Security – Spring 2024


Assignment 3
Note:
• This is a group assignment can be submitted in a group of two or three.
• Give a description of the tasks performed by each member specifically. Without this statement, a
zero mark is rewarded to all the three members.

Deadline

• 9th May 2025 (11:59 pm) over TEAMS


Problem:
Task 1: You need to write a detailed report on the comparison of the following:

• FIPS 140-2
• FIPS 140-3
• Common Criteria for security evaluations
You will get the details of the above from the following links:
https://csrc.nist.gov/publications/fips
For Common criteria, use Wikipedia or other authentic websites to read from.

Task 2:
What is an API security (relevant yourself to the information security aspect only)? For example,
you have an API which is part of a critical system. What are the key steps in evaluating the API
using common criteria (CC)? You need to provide detailed evaluation steps. For this you can refer
to the evaluation of IT security devices using CC.

Submission:
Report of each task is in a separate pdf. Report format is already shared. Create a combined zip file and
submit a single rar before the deadline.

You might also like