Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2016 4 November 2016 rev. 16.0 2014 2016 Egemen K. Çetinkaya
Exam 2 Logistics Overview Exam 2 will be held on 4 November 2016 You are responsible from all material covered exam 2 will cover topics from the beginning of the class emphasis will be on topics covered after Exam 1 Cheating is prohibited! read course policies as a reminder Closed notes, books, no calculator Distance students need scanner/camera to send any hand drawing and for proctoring 2
Exam 2 Logistics Style Exam duration will be 50 minutes Exam will include different types of questions fill in the blanks short answer long answer requires conceptual thinking Limited writing space do not write to the back of page irrelevant text will not get any credit You are engineers: pay attention to units 3
Exam 1 Topics 4
Networking Overview What are the E2E principles? How do they relate to security? What are network/computing resources? 5
What is resilience? Resilience Overview How does it related to security? What are the important resilience disciplines? 6
Security Overview What are the important security subdisciplines? also called security services Active and passive attacks? 7
Basic definitions Crypto Overview cryptography, cryptology, cryptanalysis, etc. What are the cryptographic system types? What are the attacks on crypto systems? Differences between perfect vs. computational secure Transposition vs. substitution ciphers? What are the important examples? What are the differences between security, obscurity, steganography? 8
Symmetric Encryption How does symmetric encryption works? what are the main features? What are the important protocols? Similarities and differences between DES and AES main structures? What are the important features of symmetric key encryption techniques? important design features? 9
Asymmetric Encryption How does asymmetric encryption works? What are the services provided? What are different modes of operation? What are the important protocols? How does RSA work? How does DH work? What are the attacks against PKCS (RSA, DH)? What are the defenses against PKCS (RSA, DH)? 10
What s hash function? Data Integrity Algorithms what are important properties? what are application areas? what are security requirements? What s message authentication? how does HMAC work? What s digital signature? What are the similarities and differences? What are the different modes of operations? What are the important protocols? 11
Key Management and Distribution What s the purpose of key distribution? How does key distribution work? What are issues and challenges of key distribution? What are the symmetric-key distribution methods? What are the public-key distribution methods? What are the important protocols? What are the important features of X.509 and PKI? 12
Post Exam 1 Topics 13
Network and User Authentication How does Kerberos work? what are the key elements of Kerberos What is federated identity management? What are personal identification techniques? 14
How does SSL work? How does TLS work? Transport Layer Security What are the security services? What is UDP-level security mechanism? Difference between TCP and UDP? 15
HTTPS? Application Layer Security What are main characteristics? HTTPS and CA relation? HTTPS vulnerabilities? E-mail security? What are main characteristics/components of e-mail? How do PGP, S/MIME, DKIM, PEM work? What are the differences and similarities? SSH? What are main characteristics? What are other application layer protocols? 16
Network Layer Security 1 Functions of network layer? What are important network layer protocols? How does routing work in the Internet? Attacks against network layer? [HW 8 & 9] What are attacks against IP? What are attacks against ICMP? What are ICMP attacks against TCP? How can we defend against such attacks? Why do we need fragmentation? What are attacks using fragmentation? defenses? 17
How does IPsec work? What are the modes? Network Layer Security 2 differences vs. similarities? What are the main IPsec protocols? What is BGP? How does it operate? What are challenges against BGP? What is DNS? How does it operate? What are challenges against DNS? 18
Why do we need MAC? Link Layer Security What are attacks against MAC layer? What is ARP spoofing? What are attacks against wireless networks? What are main characteristics of IEEE 802.11i? Main protocols in 802.11i? 19
Network Access Control What are network access control components? Methods of NAC? Types of firewalls? Pitfalls of firewalls? Difference between firewall and ACL? 20
Anomaly Detection What are cases of correct event detection? What are anomaly detection categories? What are anomaly classification types? How does IDS mechanisms differ between wired and wireless networks? How does wavelet analysis can be utilized for IDS? What are the features of an ideal IDS system? 21
Questions? 22