Professional Documents
Culture Documents
Review
Angelos Stavrou
December 4, 2007
The Exam
The Exam
The Exam
■ 7:20pm - 9:30pm, Thursday, Dec 11th, in the
Material
Test Conditions
Lab (STI-128)
Introduction
■ Same style of questions as the midterm
Cryptography
Applications
Intrusion Detection
Worms and Denial
of Service
2 / 31
Material
The Exam
The Exam
■ If it’s in my slides or I said it in class, you’re
Material
Test Conditions
responsible for it
Introduction
■ There may be some questions based on the
Cryptography
Web Security
Labs
IPsec
Applications
■ You’re responsible for the assigned Labs and
Intrusion Detection Homeworks at about the level of class
Worms and Denial
of Service coverage.
3 / 31
Test Conditions
The Exam
The Exam
■ Open book
Material
Test Conditions ■ Open notes, posted code, manuals, Labs. . .
Introduction
4 / 31
Terminology
The Exam ■ Confidentiality, integrity, availability
Introduction
Terminology
Kinds of Threats
■ Threats, attacks, and vulnerabilities
Assets
Cryptography
Web Security
IPsec
Applications
Intrusion Detection
Worms and Denial
of Service
5 / 31
Kinds of Threats
The Exam ■ Joy hackers
Introduction
Terminology
Kinds of Threats
■ Criminals
Assets
Cryptography ■ Competitors
Web Security
IPsec
■ Nation states
Applications
Intrusion Detection
■ Insiders
Worms and Denial
of Service
6 / 31
Assets
The Exam ■ Protect what?
Introduction
Terminology
Kinds of Threats
■ Bandwidth, CPU, data, identity
Assets
IPsec
Applications
Intrusion Detection
Worms and Denial
of Service
7 / 31
Ciphers
The Exam ■ What is a cryptosystem?
Introduction
Web Security
■ What are the different modes of operation?
IPsec What are their properties? When would you
Applications
Intrusion Detection
use each mode?
Worms and Denial
of Service ■ What is a stream cipher?
8 / 31
Public Key Cryptography
The Exam ■ What is it? What is it good for? Limitations?
Introduction
Applications
Intrusion Detection
Worms and Denial
of Service
9 / 31
Certificates
The Exam ■ Trust properties
Introduction
Cryptography ■ CAs
Ciphers
Public Key
Cryptography ■ Authorization versus identity certificates
Certificates
10 / 31
SSL
The Exam ■ What is SSL?
Introduction
IPsec
Applications
Intrusion Detection
Worms and Denial
of Service
11 / 31
Web Certificates
The Exam ■ Root certificates
Introduction
IPsec
Applications
Intrusion Detection
Worms and Denial
of Service
12 / 31
Browser Security
The Exam ■ Why is it a problem?
Introduction
IPsec
Applications
Intrusion Detection
Worms and Denial
of Service
13 / 31
Continuing Authentication
The Exam ■ Cookies
Introduction
IPsec
Applications
Intrusion Detection
Worms and Denial
of Service
14 / 31
Web Server Security
The Exam ■ Why?
Introduction
IPsec
Applications
Intrusion Detection
Worms and Denial
of Service
15 / 31
Email Security
The Exam ■ Usual evaluation
Introduction
IPsec
Applications
Intrusion Detection
Worms and Denial
of Service
16 / 31
Phishing
The Exam ■ What is it?
Introduction
IPsec
Applications
Intrusion Detection
Worms and Denial
of Service
17 / 31
Defenses
The Exam ■ Mutual authentication
Introduction
Cryptography ■ Personalization
Web Security
SSL
Web Certificates
■ DKIM
Browser Security
Continuing
Authentication
■ Non-reusable credentials
Web Server Security
Email Security ■ (MITM attacks; human factors)
Phishing
Defenses
IPsec
Applications
Intrusion Detection
Worms and Denial
of Service
18 / 31
IPsec
The Exam ■ What is IPsec, and why?
Introduction
IPsec ■ SPI
IPsec
Packet Processing
Attacking IPsec
■ SAs
Applications
Intrusion Detection
■ Tunnel and transport mode
Worms and Denial
of Service
19 / 31
Packet Processing
The Exam ■ Outbound and inbound
Introduction
Applications
Intrusion Detection
Worms and Denial
of Service
20 / 31
Attacking IPsec
The Exam ■ Cut-and-paste attacks
Introduction
Applications
Intrusion Detection
Worms and Denial
of Service
21 / 31
Applications
The Exam ■ SSH
Introduction
Cryptography ■ SIP
Web Security
Intrusion Detection
Worms and Denial
of Service
22 / 31
SSH
The Exam ■ Features
Introduction
Intrusion Detection
■ SSH Agent
Worms and Denial
of Service
23 / 31
SIP
The Exam ■ SIP architecture
Introduction
Intrusion Detection
■ Complex scenarios
Worms and Denial
of Service
24 / 31
What is IDS?
The Exam ■ Purpose
Introduction
Intrusion Detection
What is IDS?
Limits of Network
IDS
IDS Architecture
Worms and Denial
of Service
25 / 31
Limits of Network IDS
The Exam ■ Insertion and evasion attack
Introduction
IPsec ■ TTLs
Applications
26 / 31
IDS Architecture
The Exam ■ Detector
Introduction
Cryptography ■ Database
Web Security
IPsec ■ Analyzer
Applications
27 / 31
Worms
The Exam ■ Worms versus viruses
Introduction
IPsec ■ Payloads
Applications
28 / 31
Denial of Service
The Exam ■ Types of DOS attack
Introduction
IPsec ■ DDoS
Applications
29 / 31
Routing Attacks
The Exam ■ Why they happen
Introduction
Cryptography ■ Goals
Web Security
Intrusion Detection
Worms and Denial
of Service
Worms
Denial of Service
Routing Attacks
Wireless Security
30 / 31
Wireless Security
The Exam ■ Evil twin
Introduction
31 / 31