Study Guide for Midterm
This is simply a guide of topics that I consider fair game for the midterm. I don't promise to ask you about them all, or about any of these in particular; but I may very well ask you about any of these.
-
Fundamentals
-
Basics of risk analysis
-
Relationship of security policy to security
-
Robust Programming
-
Security in Programming
-
Unknown interaction with other system components
-
Overflow (both numeric and buffer)
-
Race conditions (TOCTTOU flaw)
-
Environment (shell variables, UIDs, file descriptors, etc.)
-
Not resetting privileges
-
Vulnerabilities Models
-
RISOS
-
PA
-
Uses
-
Penetration Studies
-
Flaw Hypothesis Methodology
-
Using vulnerabilities models
-
Policies
-
Mandatory Access Control (MAC)
-
Discretionary Access Control (DAC)
-
Originator-Controlled Access Control (ORCON)
-
Role-Based Access Control (RBAC)
-
Policy languages
-
Confidentiality Models
-
Bell-LaPadula Model
-
Lattices and the BLP Model
-
Integrity Models
-
Biba's model
-
Clark-Wilson Integrity Model
-
Cryptography
-
Types of attacks: ciphertext only, known plaintext, chosen plaintext
-
Types of ciphers: substitution, transposition, product (both substitution and transposition)
-
Goal of ciphers; what makes a cipher theoretically unbreakable
-
Caesar cipher, Vigenère cipher, one-time pad, DES
-
Public key cryptosystems
-
RSA
-
Confidentiality and authentication with secret key and public key systems