**This is an old revision of the document!**
Exam 2
Date: Tues Dec 8th
Location: In Class
Closed book, No notes
Study the lecture slides available on the web site, and other readings
Secure email (example of how we combine symmetric and asymmetric encryption to send an encrypted message). Understand the theory of how the two common systems we studied work and know the differences between them
TLS Handshake
Multi-Factor Authentication
Buffer Overflow Attacks
diagram and the state that the program is in and will be in
Binary extraction attacks and the use of a debugger.
Integer Manipulation Vulnerabilities
Passwords
Attacks against, and countermeasures for programs that hold passwords
SQL injection, prevention and mitigation techniques
Web App Vulnerabilities, prevention and mitigation techniques
Command Injection Vulnerabilities, prevention and mitigation techniques
Usability as a security problem - be prepared to give examples and explain
Ken Thompson compiler hack - how it works
Principle of Least Privilege and how it relates to Defense in Depth
ANYTHING in any of your projects, or homework assignments.
Remaining topics are for final exam
Social Engineering
Review Exam 1 problems