You are on page 1of 12

(C)ITM-820

Information Systems Security and


Privacy

Final Exam Review

1
Final exam Review
For the final exam:
 Study midterm syllabus
 And this Review + Lecture-11
 There are 80 Multiple Choice Questions in the exam

2
Final exam Review..
 Classes of intruders :
 Activists
 State sponsored organizations
 Intruder Skill Levels:
 Apprentice
 Journeyman
 Master
 Intruder behavior
 Host based IDS
 Network based IDS
 Hybrid IDS

3
Final exam Review..
 IDS Requirement
 Information logged by a NIDS sensor
 Honeypots
 Risk associated with honeypots
 Low interaction honeypots
 High Interaction honeypots
 Firewalls
 Packet filtering firewalls
 Application proxy
 Host based firewalls

4
Final exam Review..
 IDPS
 Host based IPS
 Network based IPS
 Securing the operating system
 Logging
 Data backup
 Linux/Unix security
 Windows Security

5
Final exam Review..
 Escaping
 Sybil attack
 Anonymous email
 Anonymous web browsing
 Onion router
 Anonymous phone calls
 Email encryption
 Steps involved in PGP process
 Steganography
 MP3Stego

6
Final exam Review..
 Multilevel security
 BLP Policy
 Objections to BLP
 Covert Channels
 BIBA integrity model
 Polyinstantiation
 Solution to polyinstantiation
 Downgrading
 Analog and digital signal
 Transmission modes

7
Final exam Review..
 Transmission media and speed
 Topology of Networks
 Bridge, Router and Switch
 Cellular Transmission
 Mobile phone infrastructure: BSC, MSC
 Mobile Phone Generations (1G, 2G, 2.5G, 3G, 4G)
 Phone Phreaking
 Clip-on
 Tumblers

8
Final exam Review..
 Problem with tumbler
 GSM Security
 SIM
 Roaming with a pre-paid SIM
 GSM Authentication Protocol

9
Final exam Review..
 IMEI
 Location Security (TMSI)
 IMSI-Catcher
 USIM
 Security Risk Assessment
 Baseline Approach
 Informal Approach
 Detailed Risk Analysis
 Generic Organizational Risk Context
 Threat Identification
 Risk rating calculation

10
Final exam Review..
 Sources of threats
 Vulnerabilities identification

11
Final exam Review..
 Logical Security
 Physical Security
 Physical Security Threats
 Effect of Dust and water on physical security
 Technical Threats
 Human caused threats

12

You might also like