Study Guide for Final
This is simply a guide of topics that I consider fair game for the
final. I don't promise to ask you about them all, or about any of these
in particular; but I may very well ask you about any of these.
- Anything from the Study Guide for Midterm
- Integrity models
- a. Biba
- b. Clark-Wilson
- Cryptography
- Types of attacks: ciphertext only, known plaintext, chosen plaintext
- Caesar cipher, Vigenère cipher, one-time pad, DES
- Public key cryptosystems; RSA
- Confidentiality and authentication with secret key and public key systems
- Key Distribution Protocols
- Kerberos and Needham-Schroeder
- Certificates and public keyinfrastructure
- Passwords (selection, storage, attacks, aging)
- One-way hash functions (cryptographic hash functions)
- UNIX password scheme, what the salt is and its role
- Password selection, aging
- Challenge-response schemes
- Attacking authentication systems: guessing passwords, spoofing system, countermeasures
- Identity
- UNIX real, effective, saved, audit UIDs
- Host names and addresses
- Cookies and state
- Anonymous remailers
- Access Control
- Multiple levels of privilege
- UNIX protection scheme
- MULTICS ring protection scheme
- ACLs, capabilities, lock-and-key
- Computerized Vermin
- Trojan horse, computer virus
- Computer worm
- Bacteria, logic bomb