Exam Review.

Slides:



Advertisements
Similar presentations
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Advertisements

Midterm Review Questions SOEN321 – Information-Systems Security.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Achieving Trusted Systems by Providing Security and Reliability Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jun Xu, Shuo Chen, Nithin Nakka and Karthik Pattabiraman.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Buffer Overflow Attacks. Memory plays a key part in many computer system functions. It’s a critical component to many internal operations. From mother.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Information Security and Computer Systems: An Integrated Approach Mark A. Holliday and Bill Kreahling, Dept of Mathematics and Computer Science Western.
Computer & Network Security
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
4P13 Week 1 Talking Points. Kernel Organization Basic kernel facilities: timer and system-clock handling, descriptor management, and process Management.
Mitigation of Buffer Overflow Attacks
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Vulnerability Study of the Android Ryan Selley, Swapnil Shinde, Michael Tanner, Madhura Tipnis, Colin Vinson (Group 8)
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Graciela Saunders.  Introduction / Review  Challenges to Embedded Security  Approaches to Embedded Security  Security Analysis & Attack Taxonomy 
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Wireless and Mobile Security
Final Exam Review. Common Attack Techniques Stack overflow – Basic version – Advanced versions Mitigations – Canary – W^X page – ASLR.
Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code Jeff Seibert, Hamed Okhravi, and Eric Söderström Presented.
Dilip Dwarakanath.  The topic I’m about to present was taken from a paper titled “Apple iOS 4 Security Evaluation” written by Dino A Dai Zovi.  Dino.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Network security 1. Security taxonomy Physical security Resource exhaustion - DDoS system/network vulnerabilities Key-based security.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
Teaching Security of Internet of Things in Using RaspberryPi Oliver Nichols, Li Yang University of Tennessee at Chattanooga Xiaohong Yuan North Carolina.
Security Protecting information data confidentiality
Mitigation against Buffer Overflow Attacks
Computer Security Revision Week
Cryptography: an overview
Chapter 15: Security.
Symmetric Cryptography
Introduction to Information Security
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Introduction to Information Security
Secure Software Confidentiality Integrity Data Security Authentication
Cryptographic Hash Functions
Chapter 8 Network Security.
MobiSys 2017 Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation Qiang Zeng joint work with Lannan.
Cryptographic Hash Functions
Presented by: Dr. Munam Ali Shah
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
Cryptography Basics and Symmetric Cryptography
Message Digest Cryptographic checksum One-way function Relevance
Security in Java Real or Decaf? cs205: engineering software
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
Cryptography: an overview
How to Mitigate the Consequences What are the Countermeasures?
Protocol ap1.0: Alice says “I am Alice”
Public Key Infrastructure
Security.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Network Security Mark Creighton GBA 576 6/4/2019.
Chapter 14: Protection.
Introduction to Course
Return-to-libc Attacks
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Exam Review

Scope Everything mentioned in this set of slides Focus on concepts; no need for memorization Exam will be open-book, open-note; but no electronic device use

Basic Security Concepts Analyzing Security Threat model Countermeasures and their effectiveness Be able to analyze these in the context of the technical knowledge we have learned in this class The concept of protection in operating systems E.g., file system access control, set-uid mechanisms

Software Vulnerabilities and Exploits Stack overflow Mechanisms for control flow hijacking Consequence of the exploit Stack overflow mitigation Canary Stack address randomization Non-executable stack

Software Vulnerabilities and Exploits Heap overflow Understand the pointer operations that allow attacker to modify arbitrary memory locations with arbitrary value Understand the mechanisms of hijacking control flows by corrupting important data structures like GOT

Software Vulnerabilities and Exploits Return oriented programming Basic mechanisms of chaining control flows by returning The concepts of gadgets and how they work

Secure Operating System Key concepts Protection state Reference monitoring Mandatory access control Detailed implementation and policy of SELinux will not be appear

Mobile System Security Android security architecture OS protection App sandbox Middleware protection: ICC

Basic Cryptography Primitives Cryptographic Hash Symmetric Encryption Asymmetric Encryption Digital Signature Message Authentication Code Properties of each primitive, and how they can be used

Authentication Password-based authentication Authentication Protocols Man-in-the-middle Attacks Special case: SSH

DNS Security DNS Cache Poisoning Attacks DNS Security Extension Only need to understand the high- level concept

Firewall Packet filtering mechanisms Firewall policy concepts