Study Guide for Final
This is simply a guide of topics that I consider fair game for the final. I don't promise to ask you about them all, or about any of these in particular; but I may very well ask you about any of these.
-
Anything from the Study Guide for Midterm
-
Key Distribution Protocols
-
Kerberos and Needham-Schroeder
-
Certificates and public key infrastructure
-
Passwords (selection, storage, attacks, aging)
-
One-way hash functions (cryptographic hash functions)
-
UNIX password scheme, what the salt is and its role
-
Password selection, aging
-
Challenge-response schemes
-
Attacking authentication systems: guessing passwords, spoofing system, countermeasures
-
Access Control
-
Access control matrix
-
Multiple levels of privilege
-
UNIX protection scheme
-
MULTICS ring protection scheme
-
ACLs, capabilities, lock-and-key
-
Assurance
-
Computerized Vermin
-
Trojan horse, computer virus
-
Computer worm
-
Bacteria, logic bomb
-
Countermeasures
-
Penetration Studies
-
Flaw Hypothesis Methodology
-
Using vulnerabilities models
-
Vulnerabilities Models
-
RISOS
-
PA
-
Aslam
-
Vulnerabilities
-
Unknown interaction with other system components
-
Overflow
-
Race conditions
-
Environment variables
-
Not resetting privileges
Here is a PDF version of this document.