Study Guide for Final
This is simply a guide of topics that I consider fair game for the final. I don't promise to ask you about them all, or about any of these in particular; but I may very well ask you about any of these.
-
Access Control Mechanisms
-
Access control matrix
-
Access control lists
-
Capabilities and capability lists
-
Multics ring-based mechanisms
-
Firewalls
-
What they are
-
Proxy (application layer) vs. filtering (network layer)
-
Filtering and redirection
-
How they are used
-
Applications
-
Electronic voting
-
Electronic recordation of real estate
-
Malicious logic
-
Trojan horses, computer viruses, computer worms, bacteria (rabbits), logic bombs
-
Different types of viruses: boot sector infectors, executable infectors, multipartite, TSR, stealth, encrypted, polymorphic, and macro
-
Theory: can't write a program to detect all computer viruses without error
-
Practice: type checking, sandboxing, limiting sharing, integrity checking, etc.
-
Safety on the web
-
WWW: applets, images, filtering content, CGI and server-side problems, redirection, naming
-
Email: attachments, spam, anti-spam technologies, phishing
-
Assurance
-
Trust, assurance, requirements, and the software life cycle
-
Evaluation of assurance: Orange Book, Common Criteria, and best practices
-
Intrusion Detection
-
Anomaly detection
-
Misuse detection
-
Specification detection
-
Host-based vs. network-based IDS
-
Any of the handouts
-
Anything on the Study Guide for Midterm
Here is a PDF version of this document.