Final Exam Review Exam time is May. 2nd 1:00pm – 3:50pm in the same classroom. All semester’s content will be tested, but more on content after midterm.

Slides:



Advertisements
Similar presentations
T T Some Fancy Technology (3 ECTS) Introduction See notes for comments.
Advertisements

Final Exam Review Exam time is Aug. 2 nd 2:00pm – 3:50pm in the same classroom. All semester’s content will be tested, but more on content after midterm.
Chapter 31 Network Security
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Midterm Exam Review Release questions via webcourse “assignment” around 10:30am, Thur. Oct. 20 th, due via webcourse at 10:30am next day Submit format:
Midterm Exam #2 Review Exam time is July 5th during class time. The second homework and lecture content after first mid-exam until this class will be covered.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Final Review. The exam Two double-sided letter size cheating sheets allowed Closed book, closed note McMaster calculator allowed Types of questions: –
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 7: Cryptographic Systems
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Midterm Exam #1 Review Exam time is Jun. 12 during class time. The first homework will be fully covered. Necessary formulas will be provided in the exam.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Part 1  Cryptography 1 Integrity Part 1  Cryptography 2 Data Integrity  Integrity  detect unauthorized writing (i.e., modification of data)  Example:
Midterm Exam Review –Time: Oct. 16 (Thursday, in class, close book) –Knowledge questions –True or false statement (explain why) –Protocols –Calculations.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Midterm Exam Review Release questions via webcourse “assignment” around 12:00pm, Mon. Oct. 28 th, due via webcourse at 12:00pm next day Submit format:
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Final Exam Review Release questions via webcourse “assignment” around 10am, 04/23 (next Monday), due via webcourse at 6pm, next day (next Tuesday) Submit.
TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April Course: CISC856 - TCP/IP and Upper Layer Protocols.
Security Protecting information data confidentiality
Computer Security Revision Week
Instructor Materials Chapter 5 Providing Network Services
Chapter 8: Network Security
IT443 – Network Security Administration Instructor: Bo Sheng
Crypto in information security
Message Integrity and Message Authentication
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
What is network security?
Midterm Exam Review Release questions via webcourse “assignment” around 1:30pm, Thur. Oct. 14th, due via webcourse at 11:59pm Submit format: Word file,
Course Information CSE 3213 – Fall 2011.
Chapter 7 Network Security
CAP6135: Malware and Software Vulnerability Analysis Basic Knowledge on Computer Network Security Cliff Zou Spring 2013 Network Security 1.
ECE/CS 372 – introduction to computer networks Lecture 16
Midterm Exam #2 Review Exam time is Mar. 28th during class time.
Basic Network Encryption
Presented by: Dr. Munam Ali Shah
Chapter 8: Network Security
CAP6135: Malware and Software Vulnerability Analysis Basic Knowledge on Computer Network Security Cliff Zou Spring 2014 Network Security 1.
CAP6135: Malware and Software Vulnerability Analysis Basic Knowledge on Computer Network Security Cliff Zou Spring 2010 Network Security 1.
Midterm Exam #1 Review Exam time is Feb. 14th during class time.
CAP6135: Malware and Software Vulnerability Analysis Basic Knowledge on Computer Network Security Cliff Zou Spring 2015 Network Security 1.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Block Cipher Modes CS 465 Make a chart for the mode comparisons
CAP6135: Malware and Software Vulnerability Analysis Basic Knowledge on Computer Network Security Cliff Zou Spring 2009 Network Security 1.
Midterm 2 Exam Review Release questions via webcourse “assignment” around 2pm, Wednesday Mar. 28th, due via webcourse at 2pm, next day Submit format: Word.
Final Exam Review Exam time is Aug. 2nd 2:00pm – 3:50pm in the same classroom. All semester’s content will be tested, but more on content after midterm.
CAP6135: Malware and Software Vulnerability Analysis Basic Knowledge on Computer Network Security Cliff Zou Spring 2016 Network Security 1.
Security at the Transport Layer: SSL and TLS
Protocol ap1.0: Alice says “I am Alice”
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Outline Using cryptography in networks IPSec SSL and TLS.
Lecture 10: Network Security.
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Cryptography Lecture 12.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Basic Network Encryption
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Security: Integrity, Authentication, Non-repudiation
Chapter 8: Network Security
Cryptography Fundamentals
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Midterm Exam Review Time: Knowledge questions
Midterm Exam Review Release questions via webcourse “assignment” around 10:30am, Thur. Oct. 25th, due via webcourse at 10:30am next day Submit format:
Final Exam - NEXT WEEK! The final exam is worth 400 points, twice as much as each of the semester exams. The remaining homework assignments count toward.
Chapter 8: Network Security
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Final Exam Review Exam time is May. 2nd 1:00pm – 3:50pm in the same classroom. All semester’s content will be tested, but more on content after midterm exam #2. What actually covered in the final exam: All questions in the 4 homework assignments and 2 quizzes will be covered. Questions/examples in previous two midterm review slides Questions/examples in this review slides.

You need to compute out the final numerical results in your answer You need to compute out the final numerical results in your answer. Do not simply write down the formula as your answer. You can bring a calculator (no computer, iPhone, etc) The numbers in exam are easy to comput

Question Types Knowledge questions True or false statement If false, explain why and give the correct statement Calculations

Knowledge Question Examples What are the two classes of cryptography? Which one is similar to shuffling poker card: Substitution cipher or transposition cipher? DES has fixed-size key while AES has options to choose several different sizes of key. What are the pros and cons for symmetric key crypto? Public key crypto? Two points: computation; key predistribution Meaning of “confidentiality”, “integrity”, “nonrepudation”, “authentication”. What are the two major hash functions in use? SHA-1 and MD5 Two different representation of “MAC”? Meaning? Media access control and message authentication code

Knowledge Question Examples Using the notation in ch31.ppt, what are the meaning of: H(m), KA-(H(m)), KCA-(KA+), KAB(m) Full name of SMTP, FTP, RR, TLD? What are the four types of DNS resource record? Service port for DNS, SMTP, HTTP, SSH, Telnet. SMTP basic commands for email compositing

Calculation Problem Examples Compute ciphertext using Cesar cipher, Vigenere cipher Compute ciphertext given transposition cipher key (ch30.ppt, P16-17) If Alice wants to send a message m to Bob confidentially and wants Bob be sure that it is from Alice, what message format should be? Assume Alice and Bob knows each other’s public key beforehand. What if only integrity is required? DNS setup and RRs for a new company (HW3)

Excluding Contents Packet fragmentation SNR and dB concepts and computation Shannon and Nyquist theories Stop-Wait ARQ and go-back-N ARQ CRC computation Checksum computation