Final Study Guide
This is simply a guide of topics that I consider fair game for the
final. I don’t promise to ask you about them all, or about any of
these in particular; but I may very well ask you about any of these.
- Anything from the Study Guide for Midterm
- Integrity Models
- Biba’s models
- Clark-Wilson model
- Cryptography
- Types of attacks: ciphertext only, known plaintext,
chosen plaintext
- Caesar cipher, Vigenère cipher, one-time pad,
DES
- Public key cryptosystems; RSA
- Confidentiality and authentication with secret key
and public key systems
- Key Distribution Protocols
- Kerberos and Needham-Schroeder
- Certificates and public key infrastructure
- Passwords (selection, storage, attacks, aging)
- One-way hash functions
(cryptographic hash functions)
- UNIX password scheme, what the salt is
and its role
- Password selection, aging
- Challenge-response schemes
- Attacking authentication systems:
guessing passwords, spoofing system, countermeasures
- Identity
- UNIX real, effective, saved, login UIDs
- Host names and addresses
- Cookies and state
- Anonymous remailers
- Access Control
- ACLs, C-Lists, lock-and-key
- UNIX protection scheme
- Multiple levels of privilege
- MULTICS ring protection scheme
- firewalls
- Computerized Vermin
- Trojan horse, computer virus
- Computer worm
- Bacteria, logic bomb
- Countermeasures
Version of March 13, 2006 at 10:08 PM
You can also obtain a PDF version of this.