Exam 2 Review CS461/ECE422 Fall 2009. Exam guidelines Same as for first exam A single page of supplementary notes is allowed  8.5x11. Both sides. Write.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
Firewalls and Intrusion Detection Systems
Chapter 12 Network Security.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 9 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Network and Server Attacks and Penetration Chapter 12.
Foundations of Network and Computer Security J J ohn Black Lecture #37 Dec 14 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
1 Protection and Security Protection = mechanisms used to control access to valued resources: e.g., programs & data stored on computer system. Usually.
Cryptography and Network Security Chapter 20 Fourth Edition by William Stallings.
Information Systems Security Security Architecture Domain #5.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Computer Security An overview of terms and key concepts.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Trusted System? What are the characteristics of a trusted system?
CSCE 815 Network Security Lecture 23 Jails and such April 15, 2003.
Software Security Testing Vinay Srinivasan cell:
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Securing Wired Local Area Networks(LANs)
Information Systems Security Operations Security Domain #9.
Attack Vectors and Mitigations. Attack Vectors ? Network Security2T. A. Yang
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Final Exam Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed Closed book No calculator Students should show.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Intrusion Detection Reuven, Dan A. Wei, Li Patel, Rinku H.
Network Programming and Network Security Lane Thames Graduate Research Assistant.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security in Networks Single point of failure Resillence or fault tolerance CS model.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Quiz 2 -> Exam Topics Fall Chapter 10a - Firewalls Simple Firewall - drops packets based on IP, port Stateful - Keeps track of connections, set.
Exam 2 Review CS461/ECE422 Fall Exam guidelines Same as for first exam A single page of supplementary notes is allowed  8.5x11. Both sides. Write.
Chapter 8: Principles of Security Models, Design, and Capabilities
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Cryptography and Network Security
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
© SYBEX Inc All Rights Reserved. CompTIA Security+ Study Guide (SY0-201) “Chapter 2: Identifying Potential Risks”
Lab #2 NET332 By Asma AlOsaimi.
CompTIA Security+ Study Guide (SY0-401)
TCSEC: The Orange Book.
(see also Q1 and Q2 Topics)
Secure Software Confidentiality Integrity Data Security Authentication
EN Lecture Notes Spring 2016
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Exam Review.
CompTIA Security+ Study Guide (SY0-401)
Firewalls Purpose of a Firewall Characteristic of a firewall
IS4680 Security Auditing for Compliance
سمینار آموزشی امنیت شبکه
Operating System Security
Lecture 3: Secure Network Architecture
CSE 542: Operating Systems
Chapter 14: Protection.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Exam 2 Review CS461/ECE422 Fall 2009

Exam guidelines Same as for first exam A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like. Closed book No calculator or other widgets. Students should show work on the exam. They can use supplementary sheets of paper if they run out of room.

Exam logistics Exam will be given during normal lecture time in 1310 DCL You will be given 50 minutes to complete the exam.

Topics Access Control Data base security Confidentiality and Integrity Policies and Models Trusted Operating Systems System Evaluation Frameworks Trusted System Development Malicious Code Network Security Threats and Controls Security Law

Access control Access Control Matrix  Common model for encoding protection state of system  HRU commands and the safety property Access Control Lists  ACM by column  Unix and windows examples Did not address capabilities this semester Did not address hardware based rings in this lecture

Database Security Access control model – Griffiths and Wade model  Basic relational model  No single owner of all data/privilege  Use “grant” to delegate privileges  Use view to shared restricted set of data  Revocation issues Integrity  Transactions  Two phase commit

Trusted Models and Policies Mandatory Access Control  How does it differ from DAC Bell-LaPadula  MLS – Confidentiality policy  Lattice of Security Labels, e.g., Security:{Proj1, Proj2}  Read down, write up  Basic Security Theorem  Tranquility

Integrity Policies Biba models  Low water mark – tries to preserve indirect information flow constraints  Ring policy – Like low water mark but doesn't attempt to address indirect flows  Strict – Dual of the BLP model Did not address this semester  Lipner Matrix model  Clark Wilson

Example Trusted OS Guest lecture by Paul McNabb Reviewed common issues  MLS and shared directories  Fine grained privileges  Constraining privileges  Labeling network data  Roles

Evaluation Framework Covered TCSEC (Orange book) and Common Criteria Assurance vs functionality requirements TCSEC  Fixed assurance and functionality evaluation levels Common Criteria  Dynamic functionality profiles and fixed assurance levels

Design Principles Salzer and Schoeder's principles  Understand and recognize application in systems

Assurance Assurance is evidence that system meets requirements Techniques for gathering evidence during product life cycle  Different types of assurance: policy, design, implementation, operational Different development processes and how they gather assurance

Secure Software Design Security architecture as focus for tracking and analyzing system security  Security requirements Documentation and requirements tracing Threat analysis  Analyze design/code – identify entry points. Develop data flow diagrams  Identify threats  Build attack trees Security testing

Malicious Code Types of malicious code  Trojan programs  Rootkits  Virus Detection and virus evasion  Worms Propagation techniques  NetBots

Common Implementation Flaws Buffer Overflow  Stack smashing Incomplete Parameter Validation Time of use to time of check Covered a little bit on ethical hacking and vulnerability research

Network Security Concerns Review the network stack Physical/Data link layer and CIA Network Layer  Routing  ARP  ICMP  Smurf

Network Security Concerns Transport (UDP/TCP)  Syn flood  Port scan  DHCP Application  Spoofing  DNS Open relay  Preferred server layout Cache poisoning

Network Security Architecture Segmentation Perimeters and domains VPNs Common network layout  In, out, DMZ

Network Security Controls Firewalls  Application proxy  Packet filter  Stateful packet filter  NAT  Identify and firewalls Intrusion Detection  Did not coverHoney pots  Mis-use/signature detection  Anomaly/statistical detection  IDS vs IPS

Law and Security Different laws apply for service providers, law enforcement, intelligence, war fighter Privacy  4 th amendment  Wiretapping and ECPA  CALEA  FISA

Law and Security Crime  CFAA  Economic Espionage Act  International laws Cryptography and the law Did not cover the Computer Use slides this semester (Did not cover the Intellectual property hidden slides this semester)

Good luck!