CS Final Exam

Similar documents
CTS2134 Introduction to Networking. Module 08: Network Security

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Information Security: Principles and Practice Second Edition. Mark Stamp

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

0x1A Great Papers in Computer Security

CSC 4900 Computer Networks: Security Protocols (2)

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

DO NOT OPEN UNTIL INSTRUCTED

ENEE 459-C Computer Security. Security protocols

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

ENEE 459-C Computer Security. Security protocols (continued)

Network Security. Thierry Sans

e-commerce Study Guide Test 2. Security Chapter 10

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

The Security Problem

L13. Reviews. Rocky K. C. Chang, April 10, 2015

19.1. Security must consider external environment of the system, and protect it from:

Introduction and Overview. Why CSCI 454/554?

CS 356 Internet Security Protocols. Fall 2013

Network Encryption 3 4/20/17

Firewalls, Tunnels, and Network Intrusion Detection

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

David Wetherall, with some slides from Radia Perlman s security lectures.

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of

A SIMPLE INTRODUCTION TO TOR

CS 43: Computer Networks Security. Kevin Webb Swarthmore College December 7, 2017

Wireless Network Security Fundamentals and Technologies

Information Security CS 526

Network Security and Cryptography. December Sample Exam Marking Scheme

Department of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus

Wireless Security and Monitoring. Training materials for wireless trainers

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Transport Level Security

CS Paul Krzyzanowski

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Application Security through a Hacker s Eyes James Walden Northern Kentucky University

Network Security - ISA 656 Review

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

INF3700 Informasjonsteknologi og samfunn. Application Security. Audun Jøsang University of Oslo Spring 2015

Internet security and privacy

CSE543 Computer and Network Security Module: Network Security

On the Internet, nobody knows you re a dog.

Chapter 19 Security. Chapter 19 Security

Lecture 12. Application Layer. Application Layer 1

CPSC 467b: Cryptography and Computer Security

Security+ SY0-501 Study Guide Table of Contents

Crowds Anonymous Web Transactions. Why anonymity?

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Internet security and privacy

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

AIT 682: Network and Systems Security

Chapter 8 Network Security

Transport Layer Security

Chapter 8 roadmap. Network Security

Understanding Cisco Cybersecurity Fundamentals

CPSC 467: Cryptography and Computer Security

Operating Systems Design Exam 3 Review: Spring 2011

Home Computer and Internet User Security

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Jaringan Komputer (IF8505) Pengamanan jaringan komputer. Cryptography

IBM i Version 7.2. Security Digital Certificate Manager IBM

Vulnerabilities in online banking applications

APNIC elearning: Cryptography Basics

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Networking Security SPRING 2018: GANG WANG

CS 494/594 Computer and Network Security

School of Computer Science

Home/Network Computing

14. Internet Security (J. Kurose)

Hacking Air Wireless State of the Nation. Presented By Adam Boileau

CHAPTER 8 SECURING INFORMATION SYSTEMS

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday)

Fall 2005 Joseph/Tygar/Vazirani/Wagner Final

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

Most Common Security Threats (cont.)

Internetworking Lecture 10. Communications and network security

Chapter 15: Security. Operating System Concepts 8 th Edition,

Introduction to IPsec. Charlie Kaufman

SSH. Partly a tool, partly an application Features:

Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis

IS-2150/TEL-2810 Introduction to Computer Security Quiz 2 Thursday, Dec 14, 2006

Full file at

Defending Yourself Against The Wily Wireless Hacker

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

1/11/11. o Syllabus o Assignments o News o Lecture notes (also on Blackboard)

CS526: Information security

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Language-Based Protection

SDR Guide to Complete the SDR

CNT Computer and Network Security: Privacy/Anonymity

Anonymous Communication and Internet Freedom

EEC-682/782 Computer Networks I

Transcription:

CS 600.443 Final Exam Name: This exam is closed book and closed notes. You are required to do this completely on your own without any help from anybody else. Feel free to write on the back of any page to continue an answer, and indicate (over) when doing so. Part I. Multiple choice: circle one choice (2 points each) 1. Which one of the following is NOT a basic property used in authentication a. Something you have b. Something you ate c. Something you are d. Something you know 2. The Microsoft Passport scheme a. Is totally secure b. Uses persistent cookies as long-term authentication tokens c. Is designed to find buffer overflow attacks d. Was designed in conjunction with the United States INS. 3. Which of the following is an example of Network Layer security a. SSL/TLS b. WEP c. IPsec d. SSH 4. The main problem with WEP is that a. The underlying cipher, RC4 is totally insecure b. The particular implementation of RC4 was flawed c. The designers should have used RC4 but they didn t d. Actually, the problems with WEP have nothing to do with RC4 5. In the privacy lingo, the term Access means a. You get to know what data is collected about you b. You get to control what data is collected about you c. You get to control who can see data that is collected about you d. That somebody has hidden your private information 6. The Iplog program sends bogus responses to nmap queries. This is useful because a. Somebody might be trying to scan the ports on your network. b. It satisfies the protocol queries, so the contract can be completed. c. It serves as a fingerprint scrubber against faulty multi-purpose agents d. It prevents attacks against the incremental IP protocol as defined by the IETF 7. Which of the following was not a problem that the Morris Worm exploited: a. A bug in the central library server b. People pick plenty poor passwords c. A bug in the sendmail program in debug mode d. A bug in the fingerd server 8. Which of the following is a DDOS tool: a. IPsec b. Trinoo c. VPN d. AFLP

9. A firewall filters packets a. Based on transport layer port numbers b. Based on network layer addresses c. Possibly based on previous state d. All of the above 10. Which of the following implementations of IPsec is the least secure: a. AH with ESP in tunnel mode b. AH with ESP in transport mode c. AH without ESP in either mode d. ESP without AH in either mode (2 points) Justify your choice: Part II. True/Fale: circle T for True or F for False (2 points each) T F 1. The PATRIOT II bill text accidentally leaked out. T F 2. A Non-Disclosure agreement is a good way to protect a trade secret if you have to share it with someone. T F 3. The Freedom of Information Act enables citizens to obtain many government records that were previously kept secret. T F 4. According to the CyberSecurity Enhancement Act ISPs can voluntarily share information with no warrant during an emergency. T F 5. Browsers always automatically reveal user s e-mail addresses to web servers. T F 6. Cookies can be used to launch denial of service attacks. T F 7. The primary legitimate use for cookies is to link multiple browsing sessions together. T F 8. Cookies were designed to enable single singon by the original architects of the web. T F 9. Web bugs only work on SSL protected pages. T F 10. Doubleclick collects browsing patterns of users across multiple web sites using embedded images in web pages. T F 11. X.10 cameras use an analog 2.4 Ghz signal, so it is hard to encrypt the content. T F 12. Mixes use public key cryptography. T F 13. Crowds uses public key cryptography. T F 14. Publius uses public key crytpgoraphy. Part III. Short answer. (use the back if necessary) (4 points each) 1. Explain how a non e-mail based computer virus/worm can copy itself from computer to computer.

2. What is the difference between a block cipher and a stream cipher? When would it be more appropriate to use each one? 3. Describe the role that zombies play in distributed denial of service attacks. 4. What are two differences between trademarks and patents? 5. Explain how cookies and Referer headers can be used to track web movements. 6. Give three reasons why voting in public elections over the Internet is not a good idea from the point of view of security.

7. The FBI s CARNIVORE system described by Ari Schwartz in class has been criticized as a privacy invading technology. Explain how security problems with the system could lead to even more serious privacy compromise. 8. Explain how the first and last mix in a Chaum mix network can collaborate to break anonymity. 9. What is the fundamental difference in the way messages are routed in Crowds versus in Mixes? 10. (Choice of two problems. Answer either one, but not both) Explain why the solution to the embedded image problem in Crowds (timing attack) introduces performance problems. OR Explain why static paths were needed in Crowds and the purpose of join commits. 11. In Publius, content is published by encrypting it with a key, secret sharing the key, and storing shares with the encrypted content. Describe a modified publishing algorithm for Publius that does not require encryption, but which yields the same security and censorship resistance properties as the one in Publius.

Part IV. Long answer. (20 points) use front and back of this sheet and the next, if necessary You have decided to set up a fancy home network. You have several housemates, Alice, Bob, and Charlie who live with you, and they each have a computer. You don t really trust them very much. You would like to run a web server out of the house. Your high-speed connection comes from an ISP called Comcast, and you would like the ability to have a laptop in the house on a wireless network. You are very worried about attacks from the outside world into your home network. It is also important for you to be able to access any outside machine from the inside. 1. Diagram your home network, showing every computer, firewall, router, server, etc 2. List the firewall rules that you would implement between your house and the ISP 3. List the firewall rules that you would implement inside your house. Specify where the firewalls are and the filtering rules that would go with each firewall. 4. If a virus infects Bob s machine, what are the risks to your computer? How does your architecture reduce those risks? 5. If you wanted to some day put all of the machines on the wireless network, how would the architecture change?