SST UG2 Exam Revision The exam will be ● closed book ● 2 hours plus 5 minutes reading time ● 2 sections A and B each with 3 questions ● Answer 2 questions.

Slides:



Advertisements
Similar presentations
Computer Security 1 [COMPGA01] Nicolas T. Courtois - University College London.
Advertisements

Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Computer Networking Revision Dr Sandra I. Woolley.
Announcements: 1. Term project groups and topics due midnight 2. HW6 due next Tuesday. Questions? This week: Primality testing, factoring Primality testing,
Security Systems Theory UG2 Module Introduction Themes 1. Top down design of security systems – security technologies as 'black boxes'. 2. Internal design.
How to Prepare for the Fall Exam COM380/CIT304 Harry Erwin, PhD University of Sunderland.
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010.
Cryptography 101 How is data actually secured. RSA Public Key Encryption RSA – names after the inventors –Rivest, Shamir, and Adleman Basic Idea: Your.
CS/CMPE 535 – Machine Learning Outline. CS Machine Learning (Wi ) - Asim LUMS2 Description A course on the fundamentals of machine.
ITC242 – Introduction to Data Communications ITC431 – Computer Networks Week 13 Exam Preparation.
Exam Duration: 10 minutes reading, 2 hours writing Total marks: 50 marks Authorised materials: CALCULATOR Reference documents will be given as part of.
Revision Week John Barnden School of Computer Science University of Birmingham Natural Language Processing /11 Semester 2.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
CRYPTOGRAPHY How does it impact cyber security and why you need to know more?
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
King Saud UniversityCSC112 - First Semester CSC 112 Java Programming I Introduction.
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Sincerity Truth Joy Justice Freedom Excellence Internationality How You Can Support At Home in Science.
What can you do to prepare for the Next Maths Exam?
Linear Systems: ECE 661 Philip D Olivier. Engineering Education (1) BS How to apply standard design techniques to standard problems, with understanding.
GE 306Dr SaMeH1 Engineering Report Writing (GE 306) Associate Professor of Environmental Eng. Civil Engineering Department Engineering College Almajma’ah.
HUT – DEPARTMENT OF MATH. APPLIED MATH 1 FUNCTION.
Math 1316 Prof. Thomas Jay. Homework: Homework problems are designed to reinforce the lecture/reading. If you miss a class, you should attempt to do.
Supporting Students to Succeed in GCSE Mathematics
Securing a Grade 5 in Mathematics
Enjoying, Achieving, Succeeding
Digital Signatures.
Course Overview - Database Systems
How Do I Revise?.
Cryptography Dr. X.
ME 520 Fundamentals of Finite Element Analysis
Year 11 Information Evening
ECE4823: WIRELESS AND MOBILE NETWORKS
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
CSE-C3400 Information security
e-Health Platform End 2 End encryption
CIS 502 Course Experience Tradition / snaptutorial.com
MA/CSSE 473 Day 10 Data Encryption RSA.
Public-Key Cryptography and RSA
Week beginning Monday 2nd May (Exams start Wednesday 4th May)
OCR GCSE Child Development
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
End of Course Exams Overview
NDA Coaching in Chandigarh
CIS 502 Competitive Success-- snaptutorial.com
CIS 502 Education for Service-- snaptutorial.com
CIS 502 Teaching Effectively-- snaptutorial.com
CIS 502 Inspiring Innovation-- snaptutorial.com
Course Overview - Database Systems
Cryptography and Computer Security for Undergraduates
MathXL® Student Overview QRB/501
CSEC Mathematics SUBJECT OUTLINE.
CS/SE 4110 Senior Seminar.
Database Management Systems CCSA 211
Information Systems and Organisations
Securing a Grade 5 in Mathematics
Page 46a Continued Advanced Engineering Mathematics by Erwin Kreyszig
T Information Security Technology
Gphys 112 COURSE OUTLINE, GRADING SYSTEM, POLICY, ETC
Look at the homework timetable on the website.
How can I support my child through GCSE History?
Technology Revision 2019.
Digital Signature Standard (DSS)
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Welcome to U6 A Level Maths
Year 11 Information Evening Mathematics
Presentation transcript:

SST UG2 Exam Revision The exam will be ● closed book ● 2 hours plus 5 minutes reading time ● 2 sections A and B each with 3 questions ● Answer 2 questions from each section Section A covers descriptive and qualitative security content and knowledge Section B covers the more technical and mathematical cryptography content.

Recommended Reading Anderson, R. (2008) Security Engineering: A Guide to Building Dependable Distributed Systems, 2e, Wiley Computer Publishing. Ferguson, N. & Schneier, B. (2003) Practical Cryptography, John Wiley & Sons. This is not optional ! You will need to understand and answer the questions asked. Just browsing the web and reading Wikipedia and my notes isn't enough, it leads to shallow learning. The exam tests deeper learning and knowledge. Rote learning won't pass at UK University undergraduate year 2 level.

Part A 1. Question on consumer firewall configuration and security design rationale. 2. Question covering your knowledge of crypto key management and Kerkhoff's principle. 3. Question covering a. Regulation of Investigatory Powers act and b. Data retention directive EU Directive 2006/24/EC

Part B 4. Question covering your knowledge of the Clark Wilson Integrity Model. 5. Question covering your knowledge of the use of prime numbers and primality testing in cryptography - with worked example calculation. 6. Question covering your understanding of RSA mathematics in key generation, encryption and decryption of small numbers.

Finally Please attend this and next week's tutorial sessions where we will be going through the RSA and prime numbers maths using debugging techniques to view these calculations step by step. Good Luck !