G53SEC 1 Revision & Exam Tips G53SEC. 2 Today’s Lecture: Revision Summary + Tips Exam Tips Preliminary Coursework Feedback.

Slides:



Advertisements
Similar presentations
Computer Security CIS326 Dr Rachel Shipsey.
Advertisements

8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
PPT Slides by Dr. Craig Tyran & Kraig Pencil The editor in charge of business books for Prentice Hall, I have traveled the length and breadth of.
Computer Security 1 [COMPGA01] Nicolas T. Courtois - University College London.
1 Copyright © 2010 AQA and its licensors. All rights reserved. Introduction to the new specification GCSE Computer Science Paul Varey.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Computer Networking Revision Dr Sandra I. Woolley.
G53SEC 1 Foundations of Computer Security. G53SEC Overview of Today’s Lecture: Definitions Fundamental Dilemma Data vs. Information Principles of Computer.
January 2011 As a precaution, re-check the exam time in early January. Various rooms are used, your room will be on your personal timetable, available.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Paper Title Your Name CMSC 838 Presentation. CMSC 838T – Presentation Motivation u Problem paper is trying to solve  Characteristics of problem  … u.
1 CS1001 Lecture Overview Java Programming Java Programming Midterm Review Midterm Review.
6/19/2015 Prof. Ehud Gudes Security Ch 1 1 Chapter 0 - Overview.
Info /7 DMU1 Components of a system Systems Analysis & Design Academic Year 2008/9 Lecture 1.
CIS700: Hardware Support for Security Professor Milo Martin
Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.
Mark Dixon, SoCCE SOFT 131Page 1 25 – Soft 131 Examination Revision.
Dr Rong Qu Module Introduction.
Miss V Tatler Computer Science Subject Leader
G53SEC Computer Security Introduction to G53SEC 1.
Computing Revision Evening. The Course ( Computing ) The Exam There is one exam paper which is worth 40% of the overall mark and takes 1½ hours Course.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
OPERATING SYSTEMS AND LANGUAGE TRANSLATORS CIS 2380 TERM 2 – LANGUAGE TRANSLATORS Lee McCluskey – 23/09/20151.
Computer & Network Security
Software engineering. What is software engineering? Software engineering is an engineering discipline which is concerned with all aspects of software.
© 2011 Wipro Ltd - Confidential New Challenges for Virtualization Siddhartha Gudgunti.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
TMK 264: COMPUTER SECURITY OVERVIEW. No SUBJECT DETAIL 1.Subject NameComputer Security 2.CodeTMK StatusCore 4.Credit Hour3 5.SemesterSemester 4,
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
ETHICS, POLICY & SECURITY ISSUES
10/23/2015CPSC , CPSC , Lecture 141 Software Engineering, CPSC , CPSC , Lecture 14.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
IB TES Information Technology in a Global Society.
Final Exam Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed Closed book No calculator Students should show.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
ITEC 352 Computer Organization Dr. Ray Lecture 1.
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
COM519 Information Systems Strategic Planning and Asset Management Introduction.
Mobile Systems Security Preliminary Course Feedback Results Ferbruary 2 nd, participants.
Network Security and Cryptography
Introduction to Network Systems Security Mort Anvari.
Able to transfer and adapt their skills Able to understand the consequences of their actions Able to use software and devices efficiently Responsible.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
PS 0128 LECTURE OVERVIEW. The Use of ICT in Education o What is ICT? o Why use ICT in education? o Benefits / advantages o Drawbacks / disadvantage o.
October 2010, Week 1INFO2009 Professional and Legal Issues Professional and Legal Issues Module Overview INFO2009 (Professional and Legal Issues)
TREN 3P14: Sustainable Integrated Waste Management Exam overview.
Security Management in Practice
CS457 Introduction to Information Security Systems
Key Stage Three Key Stage Three Revision Materials Top Tips
CSE-C3400 Information security
Understanding Standards: Administration and IT National 5
CMGT 245 Education for Service-- snaptutorial.com.
The Advantages of Database
CMGT 245 Teaching Effectively-- snaptutorial.com.
Understanding Standards: Accounting An Overview of Course Assessment
Engineering Secure Software
Introduction to Computer Security II
Computer Security CIS326 Dr Rachel Shipsey.
TREN 3P14: Sustainable Integrated Waste Management
T Information Security Technology
Chapter 4: Security Policies
Computer Security CIS326 Dr Rachel Shipsey.
Definition Of Computer Security
Chapter 5 Computer Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

G53SEC 1 Revision & Exam Tips G53SEC

2 Today’s Lecture: Revision Summary + Tips Exam Tips Preliminary Coursework Feedback

G53SEC 3 Lectures Overview: Foundations of Security Authentication and Identification Access Control and Enforcement Cryptography – only basics from Guest Lecture Network Security Hardware Security – Ross Anderson’s book Software Security Mobile Security Copyright and Privacy – Ross Anderson’s book

G53SEC 4 Revision Tips: Lecture Slides Gollmann – Theory and Definitions Anderson – Hardware security, Copyright and Privacy, Examples in real life and failures Guest Lectures – Examples of PKI/cryptography and example research and real life Coursework Experience - Examples

G53SEC 5 Exam Tips: 1.5 hours Answer ONE compulsory question and CHOOSE TWO more questions to answer Past Papers Module name changed from G5CSEC to G53SEC Past papers available from student portal Course content changed! Questions will differ from past papers but they will be the most similar to last year’s Format of exam paper the same

G53SEC 6 Example Answer: Q: Name and give brief definition of the three goals of computer security. A: Confidentiality - The prevention of unauthorised users reading sensitive information Integrity - integrity deals with the prevention of unauthorised writing Availability - The property of being accessible and useable upon demand by an authorised entity.

G53SEC 7 Coursework Feedback: Individual reports: Varied volume of information Few pages of report (1-3) vs pages of report Varied level of complexity Professional vs. Funfair look!? Your View?

G53SEC 8 End: Thanks and good luck with the exam!