Study Guide for Midterm
This is simply a guide of topics that I consider fair game for the midterm. I don't promise to ask you about them all, or about any of these in particular; but I may very well ask you about any of these.
- 
Fundamentals
 
- 
Basics of risk analysis
 
- 
Relationship of security policy to security
 
- 
Robust Programming
 
- 
Security in Programming
 
- 
Unknown interaction with other system components
 
- 
Overflow (both numeric and buffer)
 
- 
Race conditions (TOCTTOU flaw)
 
- 
Environment (shell variables, UIDs, file descriptors, etc.)
 
- 
Not resetting privileges
 
- 
Vulnerabilities Models
 
- 
RISOS
 
- 
PA
 
- 
Uses
 
- 
Penetration Studies
 
- 
Flaw Hypothesis Methodology
 
- 
Using vulnerabilities models
 
- 
Policies
 
- 
Mandatory Access Control (MAC)
 
- 
Discretionary Access Control (DAC)
 
- 
Originator-Controlled Access Control (ORCON)
 
- 
Role-Based Access Control (RBAC)
 
- 
Policy languages
 
- 
Confidentiality Models
 
- 
Bell-LaPadula Model
 
- 
Lattices and the BLP Model
 
- 
Integrity Models 
 
- 
Biba's model 
 
- 
Clark-Wilson Integrity Model
 
- 
Cryptography
 
- 
Types of attacks: ciphertext only, known plaintext, chosen plaintext
 
- 
Types of ciphers: substitution, transposition, product (both substitution and transposition)
 
- 
Goal of ciphers; what makes a cipher theoretically unbreakable
 
- 
Caesar cipher, Vigenère cipher, one-time pad, DES
 
- 
Public key cryptosystems
 
- 
RSA
 
- 
Confidentiality and authentication with secret key and public key systems