final exam review
play

Final Exam Review CS461/ECE422 Fall 2009 Exam guidelines A single - PowerPoint PPT Presentation

Final Exam Review CS461/ECE422 Fall 2009 Exam guidelines A single page of supplementary notes is allowed Closed book No calculator Students should show work on the exam. They can use supplementary sheets of paper if they run out


  1. Final Exam Review CS461/ECE422 Fall 2009

  2. Exam guidelines  A single page of supplementary notes is allowed  Closed book  No calculator  Students should show work on the exam. They can use supplementary sheets of paper if they run out of room.  Students can use scratch paper if desired.

  3. Topic Distribution  The final is cumulative − Material from the first two exams − Plus material from after Thanksgiving  Follows same structure as midterm exams − But longer − Aiming for 1.5-2 hours

  4. Exam Logistics  8am Friday, December 18 − Last name begins with A-O:  1310 DCL − Last name begins with P-Z:  138 Henry Administration Building (HAB)  Conflict exam as needed

  5. Course Goals  Introduction to computer security information − Basis for deeper study − Ability to interpret security articles/information more critically − Improve your security awareness as a computer professional − Some fun party tricks

  6. Topics First Half  Introductory definitions  Security Policies  Risk Analysis  Historical Cryptography  Symmetric Cryptography  Public or Asymmetric Cryptography  Authentication  Key Management

  7. Topics Second Half Access Control  Database Access Control  Trusted OS − Policies and Models − Features and design  Assured Systems − Design and development − Evaluation  Malware  Network Security Controls and Architecture  Security and Law

  8. Topics Third Portion  IPSEC and SSL  Physical Security − Forensics  EMSEC  Wireless − WEP as a case study − WPA

  9. SSL and IPSec  Examples of crypto techniques and protocols used in the real world  SSL – transport layer − Session vs connections − Handshake protocol  Authenticate and agree upon common data  Compression, encryption, and integrity  IPSec – network layer − Tunnel and transport mode − AH/ESP − Nested tunnels − Encryption and integrity

  10. Physical Security  Must consider physical world in security planning  Forensics/Spying − Chain of custody − Finding data on disk − Paper disposal − Output device

  11. EMSEC  Emanations Scanning − TEMPEST  Use AM radio to detect screen radiation  Hide information in dither  Tempest fonts  Protections − Shielding − Physical separation. red/back  RFID

  12. WEP Case Study  Good Crypto put together badly − RC4 stream cipher  Must restart key stream with each packet  Not avoiding known bad keys − CRC used for message integrity − No provision for automatic rekeying  Corrected in two phases in WPA and WPA2 − New chopchop attack against TKIP

  13. Thanks for participating! Good Luck!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend