Study Guide for Final
This is simply a guide of topics that I consider fair game for the
final. I don't promise to ask you about them all, or about any of these
in particular; but I may very well ask you about any of these.
- Anything from the Study Guide for Midterm
- Passwords (selection, storage, attacks, aging)
- One-way hash functions (cryptographic hash functions)
- UNIX password scheme, what the salt is and its role
- Password selection, aging
- Challenge-response schemes
- Attacking authentication systems: guessing passwords, spoofing
system, countermeasures
- Privileges
- UNIX real, effective, saved, audit UIDs
- Setuid, setgid
- Roles
- Memory Management
- Tagged architectures
- Segmentation
- Paging
- Access Control
- Multiple levels of privilege
- UNIX protection scheme
- MULTICS ring protection scheme
- ACLs, capabilities, lock-and-key
- Mandatory Access Control (MAC), Bell-LaPadula model; lattices
- Discretionary Access Control (DAC)
- Originator Controlled Access Control (ORCON)
- Integrity Models
- Biba's model
- Clark-Wilson model
- File signature generation (integrity checksumming, etc.) and
checking
- Safe practises ("safe hex")
- Type checking
- Computerized Vermin
- Trojan horse, computer virus
- Computer worm
- Bacteria, logic bomb
- Trust
- Network Security
- ISO Model and security services
- Kerberos
- Certificates and certificate management
Send email to
cs153@csif.cs.ucdavis.edu.
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 12/10/99