Midterm Study Guide
This is simply a guide of topics that I consider important for the midterm. I don’t promise to ask you about them all, or about any of these in particular; but I may very well ask you about any of these, as well as anything we discussed in class, in the discussion section, or that is in the readings (including the papers).
- Fundamentals
- What is security?
- Basics of risk analysis
- Relationship of security policy to security
- Policy vs. mechanism
- Assurance and security
- Saltzer’s and Schroeder’s principles of secure design
- Robust programming
- Common vulnerabilities
- Buffer overflows
- Injections (SQL, command)
- Failure to check inputs
- Execution with unnecessary privileges
- Penetration studies
- Flaw hypothesis methodology
- Scoping the system
- Attack models
- Attack trees
- Requires/provides model
- Access control matrix
- Matrix
- Primitive operations
- Commands
- Harrison-Ruzzo-Ullman result (undecidability of safety)
- Access Control
- ACLs, C-Lists
- UNIX protection scheme
- Multiple levels of privilege
- Lock and key
- MULTICS ring protection scheme
- Malware
- Trojan horse, replicating Trojan horse
- Computer virus
- Computer worm
- Bacteria, logic bomb
- Keystroke logger
- Ransomware
- Botnets
- Countermeasures