Final Study Guide
This is simply a guide of topics that I consider important for the final. I don’t promise to ask you about them all, or about any of these in particular; but I may very well ask you about any of these, as well as anything we discussed in class, in the discussion section, or that is in the readings (including the chapters).
- Anything from before the midterm
- Cryptography
- Public key cryptography
- Cryptographic checksums (one-way hashes)
- Digital signatures
- Cryptographic Techniques
- Interchange, session keys
- Needham-Schroeder
- Key generation, random numbers
- Certificates and infrastructure; public key infrastructure
- Networks and ciphers
- PGP, TLS protocols
- Network Security
- Firewalls
- DMZs
- Denial of service attacks, countermeasures
- Intrusion detection
- Authentication
- Passwords (selection, storage, attacks, aging)
- One-way hash functions (cryptographic hash functions)
- UNIX password scheme, what the salt is and its role
- Password selection, aging
- Challenge-response schemes
- Biometrics and other validation techniques
- Access Control
- ACLs, C-Lists, lock-and-key
- UNIX protection scheme
- Multiple levels of privilege
- Lock and key
- MULTICS ring protection scheme
- Malware
- Types of malware
- Countermeasures