Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS/IS 196 Midterm Review Midterm: Monday, November 23.

Similar presentations


Presentation on theme: "CS/IS 196 Midterm Review Midterm: Monday, November 23."— Presentation transcript:

1 CS/IS 196 Midterm Review Midterm: Monday, November 23

2 Midterm Overview Chapters 1 through 12 Multiple Choice Similar to questions at the end of each chapter and in the homework assignments. 50 questions You will have the full class time to complete

3 Chapter 1 Introduction and Security Trends Critical infrastructures Elite hackers Hacker Hacking Hacktivist Highly structured threat Information warfare Ping sweep Port scan Script kiddies Structured threat Unstructured threat

4 Chapter 2 General Security Concepts Access control Authentication Availability Confidentiality Data aggregation Diversity of defense Hacking Host security Implicit deny Integrity Layered security Least privilege Nonrepudiation Phreaking Security through Obscurity Separation of Duties Simple Security Rule Social engineering

5 Chapter 3 Operational and Organizational Security Biometrics Bluetooth Guidelines Heating, Ventilation, and Air Conditioning (HVAC) IEEE 802.11 Physical security Policies Procedures Standards TEMPEST Uninterruptible power supply (UPS)

6 Chapter 4 The Role of People in Security Backdoor Dumpster diving Phishing Piggybacking/Tailgating Reverse social engineering Shoulder surfing Social engineering Vishing

7 Chapter 5 Cryptography Algorithm Block cipher Collision attack Cryptanalysis Cryptography Digital rights management Hash Key Key escrow Key management Keyspace Multiple encryption Shared secret Steganography Stream cipher

8 Chapter 6 Public Key Infrastructure (PKI) Certificate authority (CA) Certificate revocation list (CRL) Certification practices statement (CPS) Digital certificate Dual control End-entity certificates Key archiving system Key escrow Key recovery Policy certificate Public key infrastructure (PKI) Registration authority (RA)

9 Chapter 7 Standards and Protocols Certificate Certificate Authority (CA) Certificate Revocation List (CRL) IPsec Pretty Good Privacy (PGP) Public key infrastructure (PKI) Secure Sockets Layer (SSL) Transport Layer Security (TLS) Wired Equivalent Privacy (WEP) Wireless Application Protocol (WAP) Wireless Transport Layer Security (WTLS) X.509

10 Chapter 8 Physical Security Access control Access tokens Biometrics BIOS passwords Bootdisk Closed circuit television (CCTV) Contactless access cards Drive imaging False negative False positive Layered access LiveCD Mantrap Multi-factor authentication Policies and procedures Smart cards USB devices

11 Chapter 9 Network Fundamentals Address Resolution Protocol (ARP) Bus topology Denial-of-service (DoS) Domain Name System (DNS) DMZ Extranet Internet Control Message Protocol (ICMP) Internet Protocol (IP) Intranet Local area network (LAN) Media Access Control (MAC) address Network Address Translation (NAT) Packet Ring topology Routing Star topology Storage area network (SAN) Transmission Control Protocol (TCP) Trunking Tunneling User Datagram Protocol (UDP) Virtual local area network (VLAN) VPN concentrator Wide area network (WAN)

12 Chapter 10 Infrastructure Security Cloud computing Coaxial cable Collision domain Firewall Hub Loop protection MAC limiting Modem Network access control Network Access Protection (NAP) Network Attached Storage Network interface card (NIC) Private branch exchange (PBX) Router Servers Shielded twisted-pair (STP) Software as a Service (SaaS) Switch Unshielded twisted-pair (UTP) Wireless access point Workstation

13 Chapter 11 Authentication and Remote Access Authentication, authorization, and accounting (AAA) Access control Accounting Authentication Authentication Header (AH) Authentication server (AS) Authorization Discretionary access control (DAC) Encapsulating Security Payload (ESP) Internet Protocol Security (IPsec) Kerberos Layer 2 Tunneling Protocol (L2TP) Mandatory access control (MAC) Point-to-Point Tunneling Protocol (PPTP) Remote Access Server (RAS) Role-based access control (RBAC) Rule-based access control (RBAC)

14 Chapter 12 Wireless Security Beacon frames Bluejacking Bluesnarfing Bluebugging Confidentiality IEEE 802.1X IEEE 802.11 WPA & WPA2 Service set identifier (SSID) WAP gap Wired Equivalent Privacy (WEP) Wireless Application Protocol (WAP) Wireless Transport Layer Security (WTLS)

15 The Midterm Bring a #2 pencil and an eraser. Mr. Hodges will supply the scantron forms. Closed book, closed note, closed computer.

16 Questions Any Questions?


Download ppt "CS/IS 196 Midterm Review Midterm: Monday, November 23."

Similar presentations


Ads by Google