Computer Security Revision Week

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Advertisements

Chapter 5 Cryptography Protecting principals communication in systems.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Intro to Cryptography Lesson Introduction
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (2) Information Security.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
CompSci 314 S2 C Modern Data Communications Revision of lectures #2 to #11 Clark Thomborson 12 August 2010.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CRYPTOVIROLOGY by Ramu Muthuraman Cpsc 620. Overview  Introduction  Justification of Cryptovirology?  Key Terms  Cryptoviral Extortion Attack  Gpcode.ag.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Information Systems Design and Development Security Precautions Computing Science.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Network security 1. Security taxonomy Physical security Resource exhaustion - DDoS system/network vulnerabilities Key-based security.
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.
Security Protecting information data confidentiality
Unit 3 Section 6.4: Internet Security
Secret Key Cryptography
A Summary in Fifteen Minutes mas y menos
Web Applications Security Cryptography 1
Reviews Rocky K. C. Chang 20 April 2007.
Chapter 15: Security.
Security Outline Encryption Algorithms Authentication Protocols
Design for Security Pepper.
ISA 400 Management of Information Security
Symmetric Cryptography
Home: Tel: , H.P.: Office: 공) 7710A
Advanced Computer Networks
ISA 330 Introduction to Proactive System Security
Lecture 8. Cyber Security, Ethics and Trust
Cryptographic Hash Functions
Cryptographic Algorithms
Outline Desirable characteristics of ciphers Uses of cryptography
Symmetric Algorithm of Cryptography
Cyber Security By: Pratik Gandhi.
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
Exam Review.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Outline Desirable characteristics of ciphers Uses of cryptography
Cryptographic Hash Functions
Presented by: Dr. Munam Ali Shah
Cryptography Basics and Symmetric Cryptography
CompTIA Security+ Study Guide (SY0-501)
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
PART VII Security.
Introduction to Symmetric-key and Public-key Cryptography
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
csci5233 computer security & integrity (Chap. 4)
Chapter 8 Information Security.
Information Security Tanachat Arayachutinan
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Security.
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Slide design: Dr. Mark L. Hornick
Unit 2: Cryptography & Cryptographic Algorithm
Symmetric Encryption or conventional / private-key / single-key
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Computer Security Revision Week Delivered by: Dr Leila Musavian Leila.Musavian@essex.ac.uk

General guides Lecture slides are important Revise example questions Revise past papers This revision is to give you guides for each week material

Week 16 Summary Things to know very well What I will not ask about Virus definition and characteristics what are the targets of viruses Ways a virus will attach to a program. How it works? Their comparisons What is Stealth Virus? What is Polymorphic virus? Prevention System and data recovery What I will not ask about Specific questions about particular viruses, e.g., What is Melissa and how it works?

Week 17 Summary Things to know very well Malware, Trojans, worms, and trapdoor definition, behaviour, protection (as much as there is in the slides) Rootkit (definition, how it works, detection and removal) XSS (definition, the two types, how it works, its dangers)

Week 17, Part II Risk analysis Security goals Different steps Being able to calculate Security goals Definition What I will not ask about Questions about specific examples of malwares that are covered in the lecture slides, e.g., Zeus trojan

Week 18 Things to know very well What I will not ask about General understanding of cryptography, How Brute forth attack works What is symmetric block cipher Different type of symmetric block cipher, e.g., Caesar, Vigenere, What is a substitution cipher Frequency analysis for an attack on a ciphertext Symmetric and asymmetric keys What I will not ask about Ascii codes

Week 19 Things to know very well What I will not ask about Shift cipher, stream cipher and block cipher AND, OR and XOR Permutation What I will not ask about Differential cryptanalysis

Week 20 Things to know very well What I will not ask about Confusion and diffusion S-Box General characteristics of DES, triple DES and AES What I will not ask about Remembering all the steps of the baby DES What year a certain cryptography was designed.

Week 21 Things to know very well What I will not ask about Public key cipher What is the public key, what is the private key? RSA Man-in-the middle attack What I will not ask about What mathematical function can be used in RSA The slides in Lecture 21 on Message authentication

Week 22 Things to know very well All of it

Week 23 Things to know very well What I will not ask about Three different methods of user authentication, examples, advantages, disadvantages (some of them are in week 24 slides) Hash or checksum The four characteristics of Cryptography checksums Birthday attack What I will not ask about Other names of checksum or hash? What is MD5 Rainbow attack

Week 24 Things to know very well What I will not ask about Three different methods of user authentication, examples, advantages, disadvantages (some of them are in week 23 slides) Challenge response authentication Attacks against passwords What I will not ask about Choosing password

Week 24-Part II Things to know very well Malicious code vulnerabilities and non-malicious code vulnerabilities Cross-site Scripting (XSS) SQL Injection Buffer Overflow Setuid Security in operating systems Objects Sharing resources Access control methods

Week 24-Part II What I will not ask about How memory is organized for a process What is the stack (I will not ask you to explain what is stack, but if you want to explain about buffer overflow vulnerability, you may want to refer to stack)

Week 25 Summary We summarized one of the past year exam, how to solve each question, how the marks are allocated.