Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
cs-465:exam-2 [2015/12/03 14:16]
fred
cs-465:exam-2 [2017/12/04 15:38] (current)
seamons
Line 1: Line 1:
 '''​Exam 2'''​ '''​Exam 2'''​
  
-Date: Tues Dec 8th+
  
 Location: In Class Location: In Class
Line 15: Line 15:
 * know record format * know record format
 * know what data is exchanged at what phases and it’s composition. * know what data is exchanged at what phases and it’s composition.
-* session resumption and how it works, and why we do it 
 * be able to explain the parts of a cipher name e.g. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 * be able to explain the parts of a cipher name e.g. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- 
- 
- 
-Multi-Factor Authentication 
  
 Buffer Overflow Attacks Buffer Overflow Attacks
Line 43: Line 38:
 * Lamport'​s Hash - how does it work? how to attack it? * Lamport'​s Hash - how does it work? how to attack it?
 * Salts - what and why? * Salts - what and why?
- 
-Attacks against, and countermeasures for programs that hold passwords 
- 
- 
-SQL injection, prevention and mitigation techniques 
- 
-Web App Vulnerabilities,​ prevention and mitigation techniques 
- 
-Command Injection Vulnerabilities,​ prevention and mitigation techniques 
- 
-Usability as a security problem - be prepared to give examples and explain ​ 
- 
  
 Ken Thompson compiler hack - how it works Ken Thompson compiler hack - how it works
  
 Principle of Least Privilege ​ and how it relates to Defense in Depth Principle of Least Privilege ​ and how it relates to Defense in Depth
- 
- 
  
 ANYTHING in any of your projects, or homework assignments. ANYTHING in any of your projects, or homework assignments.
  
- +Review Exam 1 problems ​ 
- +* MAC/HMAC, hashes and how they are implemented,​ and how they are not the same 
- +* digital signatures
  
 Remaining topics are for final exam Remaining topics are for final exam
Line 75: Line 55:
 * How to defend against it? * How to defend against it?
  
-Review Exam 1 problems ​ 
-* MAC/HMAC, hashes and how they are implemented,​ and how they are not the same 
cs-465/exam-2.1449177364.txt.gz · Last modified: 2015/12/03 14:16 by fred
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0