Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

Similar documents
Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Cryptography and Network Security

Introduction and Overview. Why CSCI 454/554?

Security+ SY0-501 Study Guide Table of Contents

Introduction to Network Security Missouri S&T University CPE 5420 Network Access Control

APNIC elearning: Cryptography Basics

Implementing Cisco Network Security (IINS) 3.0

Understanding Cisco Cybersecurity Fundamentals

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Informal Write-up on CCNA Security. October, 2009 (V1.0)

BCA III Network security and Cryptography Examination-2016 Model Paper 1

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Information Security: Principles and Practice Second Edition. Mark Stamp

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:

Faculty of Science & Information Technology

Introduction to information Security

Assignment - 1 Chap. 1 Wired LAN s

CS System Security 2nd-Half Semester Review

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Threat Pragmatics & Cryptography Basics. PacNOG July, 2017 Suva, Fiji

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

(2½ hours) Total Marks: 75

Network Security Chapter 8

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

CSCE 813 Internet Security Final Exam Preview

Network Security. Thierry Sans

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Implementing Cisco Cybersecurity Operations

CRYPTOGRAPHY AND NETWORK SECURITY

Lecture 1: Introduction to Security Architecture. for. Open Systems Interconnection

San José State University School/Department Computer Science 265: Cryptography and Computer Security, Fall 2017

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

MLR Institute of Technology

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Resilient Networks Missouri S&T University CPE 6510 Network Security Overview

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Syllabus: The syllabus is broadly structured as follows:

Software Development & Education Center Security+ Certification

Configuring SSL Security

Jaringan Komputer (IF8505) Pengamanan jaringan komputer. Cryptography

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

CompTIA Security+ Certification

Information Security CS 526

CSci530 Final Exam. Fall 2011

Chapter 6: Security of higher layers. (network security)

Cryptography MIS

AIT 682: Network and Systems Security

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

NIST Cryptographic Toolkit

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

CompTIA Security+ (Exam SY0-401)

COURSE PLAN. Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor. Name Of The Programme:: B.

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Lecture 6 - Cryptography

Network Security and Cryptography. December Sample Exam Marking Scheme

Introduction to Cryptography. Vasil Slavov William Jewell College

Cipher Suite Configuration Mode Commands

KALASALINGAM UNIVERSITY

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

10EC832: NETWORK SECURITY

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

SRI VENKATESWARA COLLEGE OF ENGINEERING

Cisco Security Solutions for Systems Engineers (SSSE) Practice Test. Version

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Transport Level Security

Computer Security Course. Midterm Review

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.

Introduction to Network Security Missouri S&T University CPE 5420 Key Management and Distribution

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

For Tricia: never dull, never boring, the smartest and bravest person I know

Chapter 8 Network Security

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Authentication, Encryption, Transport, IP Version and VPN Routing

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48

Public Key Infrastructure. What can it do for you?

SYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.

Introduction to Network Security Missouri S&T University CPE 5420 Application and Transport Layer Security

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Overview. SSL Cryptography Overview CHAPTER 1

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

SSL/TLS. Pehr Söderman Natsak08/DD2495

Table of Contents. Computer Networks and the Internet

Transcription:

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2016 4 November 2016 rev. 16.0 2014 2016 Egemen K. Çetinkaya

Exam 2 Logistics Overview Exam 2 will be held on 4 November 2016 You are responsible from all material covered exam 2 will cover topics from the beginning of the class emphasis will be on topics covered after Exam 1 Cheating is prohibited! read course policies as a reminder Closed notes, books, no calculator Distance students need scanner/camera to send any hand drawing and for proctoring 2

Exam 2 Logistics Style Exam duration will be 50 minutes Exam will include different types of questions fill in the blanks short answer long answer requires conceptual thinking Limited writing space do not write to the back of page irrelevant text will not get any credit You are engineers: pay attention to units 3

Exam 1 Topics 4

Networking Overview What are the E2E principles? How do they relate to security? What are network/computing resources? 5

What is resilience? Resilience Overview How does it related to security? What are the important resilience disciplines? 6

Security Overview What are the important security subdisciplines? also called security services Active and passive attacks? 7

Basic definitions Crypto Overview cryptography, cryptology, cryptanalysis, etc. What are the cryptographic system types? What are the attacks on crypto systems? Differences between perfect vs. computational secure Transposition vs. substitution ciphers? What are the important examples? What are the differences between security, obscurity, steganography? 8

Symmetric Encryption How does symmetric encryption works? what are the main features? What are the important protocols? Similarities and differences between DES and AES main structures? What are the important features of symmetric key encryption techniques? important design features? 9

Asymmetric Encryption How does asymmetric encryption works? What are the services provided? What are different modes of operation? What are the important protocols? How does RSA work? How does DH work? What are the attacks against PKCS (RSA, DH)? What are the defenses against PKCS (RSA, DH)? 10

What s hash function? Data Integrity Algorithms what are important properties? what are application areas? what are security requirements? What s message authentication? how does HMAC work? What s digital signature? What are the similarities and differences? What are the different modes of operations? What are the important protocols? 11

Key Management and Distribution What s the purpose of key distribution? How does key distribution work? What are issues and challenges of key distribution? What are the symmetric-key distribution methods? What are the public-key distribution methods? What are the important protocols? What are the important features of X.509 and PKI? 12

Post Exam 1 Topics 13

Network and User Authentication How does Kerberos work? what are the key elements of Kerberos What is federated identity management? What are personal identification techniques? 14

How does SSL work? How does TLS work? Transport Layer Security What are the security services? What is UDP-level security mechanism? Difference between TCP and UDP? 15

HTTPS? Application Layer Security What are main characteristics? HTTPS and CA relation? HTTPS vulnerabilities? E-mail security? What are main characteristics/components of e-mail? How do PGP, S/MIME, DKIM, PEM work? What are the differences and similarities? SSH? What are main characteristics? What are other application layer protocols? 16

Network Layer Security 1 Functions of network layer? What are important network layer protocols? How does routing work in the Internet? Attacks against network layer? [HW 8 & 9] What are attacks against IP? What are attacks against ICMP? What are ICMP attacks against TCP? How can we defend against such attacks? Why do we need fragmentation? What are attacks using fragmentation? defenses? 17

How does IPsec work? What are the modes? Network Layer Security 2 differences vs. similarities? What are the main IPsec protocols? What is BGP? How does it operate? What are challenges against BGP? What is DNS? How does it operate? What are challenges against DNS? 18

Why do we need MAC? Link Layer Security What are attacks against MAC layer? What is ARP spoofing? What are attacks against wireless networks? What are main characteristics of IEEE 802.11i? Main protocols in 802.11i? 19

Network Access Control What are network access control components? Methods of NAC? Types of firewalls? Pitfalls of firewalls? Difference between firewall and ACL? 20

Anomaly Detection What are cases of correct event detection? What are anomaly detection categories? What are anomaly classification types? How does IDS mechanisms differ between wired and wireless networks? How does wavelet analysis can be utilized for IDS? What are the features of an ideal IDS system? 21

Questions? 22