Foundations of Network and Computer Security J J ohn Black Lecture #22 Oct 21 st 2009 CSCI 6268/TLEN 5550, Fall 2009.

Slides:



Advertisements
Similar presentations
You will need a red readers handbook from the bookshelf by your desk!
Advertisements

PPT Slides by Dr. Craig Tyran & Kraig Pencil The editor in charge of business books for Prentice Hall, I have traveled the length and breadth of.
Study Strategies for Mid-Terms! Online Workshop Russell Conwell Center Natalie Walker.
ECO120 Macroeconomics Rod Duncan Lecture 1- Introduction to Macroeconomics.
G53SEC 1 Revision & Exam Tips G53SEC. 2 Today’s Lecture: Revision Summary + Tips Exam Tips Preliminary Coursework Feedback.
CPSC 322, Lecture 37Slide 1 Finish Markov Decision Processes Last Class Computer Science cpsc322, Lecture 37 (Textbook Chpt 9.5) April, 8, 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 9 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
CMSC 456 Introduction to Cryptography
EECS 122 Communications Networks Department of Electrical Engineering and Computer Sciences University of California Berkeley Slides: K. Fall, K. Lai,
Foundations of Network and Computer Security J J ohn Black Lecture #11 Oct 4 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #5 Sep 7 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #37 Dec 14 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
EEC-484/584 Computer Networks Lecture 11 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
CSE331: Introduction to Networks and Security Lecture 7 Fall 2002.
Foundations of Network and Computer Security J J ohn Black Lecture #12 Sep 23 rd 2009 CSCI 6268/TLEN 5550, Fall 2009.
Parallel & Distributed Computing Fall 2004 Comments About Final.
Foundations of Network and Computer Security J J ohn Black Lecture #3 Aug 28 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Cryptography and Network Security Chapter 12 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Foundations of Network and Computer Security J J ohn Black Lecture #5 Sep 6 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Opportunistic Packet Scheduling and Media Access Control for Wireless LANs and Multi-hop Ad Hoc Networks Jianfeng Wang, Hongqiang Zhai and Yuguang Fang.
Foundations of Network and Computer Security J J ohn Black Lecture #24 Nov 23 rd 2004 CSCI 6268/TLEN 5831, Fall 2004.
Foundations of Network and Computer Security J J ohn Black Lecture #25 Nov 23 rd 2004 CSCI 6268/TLEN 5831, Fall 2004.
Foundations of Network and Computer Security J J ohn Black Lecture #6 Sep 10 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #11 Sep 21 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #27 Dec 8 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #12 Sep 24 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #36 Dec 12 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #15 Oct 19 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
Foundations of Network and Computer Security J J ohn Black Lecture #14 Oct 1 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
CSE 473/573 Computer Vision and Image Processing (CVIP) Ifeoma Nwogu Lecture 35 – Review for midterm.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2013.
Understanding data communications Taekyoung Kwon
Network Technologies (TCP/IP Suite) Tahir Azim
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Computer Science CPSC 322 Lecture 13 Arc Consistency (4.5, 4.6 ) Slide 1.
Lecture 1 Page 1 CS 111 Summer 2013 Introduction CS 111 Operating System Principles Peter Reiher.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 26 Review of Some Mid-Term Problems.
CSS 290: Video Games and Computer Programming. CSS 2902 Reading: Conditional Statements PLAD, Chapter 5 (“Repetition Structures”) –5.1: Overview –5.2:
CPSC 422, Lecture 21Slide 1 Intelligent Systems (AI-2) Computer Science cpsc422, Lecture 21 Oct, 30, 2015 Slide credit: some slides adapted from Stuart.
Quiz , Round to the nearest 10.
Course overview March 3rd. Instructor information Instructor: Artem A. Lenskiy ( 아르텸 랜스키 ) Office: F410, 1 st engineering building Phone:
REMINDER: If you haven’t yet passed the Gateway Quiz, make sure you take it this week! (You can find more practice quizzes online in the Gateway Info menu.
King Saud University1 CSC 112 Java Programming I Introduction.
08/29/2006 Introduction INTRODUCTION Instructor: Petru S. Fodor Class webpage: PHYSICS 243H.
We’ll be spending a few minutes talking about Quiz 2 on Sections that you’ll be taking the next class session, before you work on Practice Quiz.
Logical Operators.  Quiz  Let's look at the schedule  Logical Operators 2.
REMINDER: If you haven’t yet passed the Gateway Quiz, make sure you take it this week! (You can find more practice quizzes online in the Gateway Info menu.
1 1.Log in to the computer in front of you –Temp account: 210class / 2.Update your in Cascadia's system –If I need to you I'll use.
Faculty Expectations University of Louisville Disability Resource Center.
PORT CONNECTION STATUS CT Lab#4. TCP packet UDP packet Ports Background.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Port Connection Status
Midterm Review.
Networks Problem Set 3 Due Oct 29 Bonus Date Oct 26
BIT 116:JavaScript.
Foundations of Network and Computer Security
Parallel & Distributed Computing Fall 2008
Automata and Formal Languages
Foundations of Network and Computer Security
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
MAT 379 Computer Networking
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black Lecture #22 Oct 21 st 2009 CSCI 6268/TLEN 5550, Fall 2009

Announcements Remember to read the virus paper Midterm is next time (Friday) Today we’ll do an overview, plus quiz solutions

What to Study Easiest way to study: –Review the slides (all online) –Review the two reading assignments –Review the quizzes More time-consuming way to study: –Review the lectures

Test Format/Content Just like the quizzes Almost anything from the lectures/reading is fair game but… –I won’t ask you to expand acronyms –I won’t ask you to produce OpenSSL commands

Content (cont) Questions will test understanding –Do you understand basic definitions Eg, what is a blockcipher, is computational indistinguishability, one-time pad, ACMA, etc How does a signature differ from a MAC? –Do you understand why algorithms work a certain way Eg, why does CBCMAC fail if message lengths vary? Why can’t K2=K3 in XCBC

Content (cont) Networking content –We did a review and the questions will correspondingly be less in-depth Eg, how does TCP differ from UDP When are fragmented packets reassembled –But, I won’t test you on things we didn’t review Eg, explain the TCP sliding window algorithm

We have 50 mins This is a 50 min exam, so it will be similar in length to the quizzes –I’d rather give a longer test, but this is a constraint with the MWF schedule Expect a slightly longer test with fewer “hard” problems –A “hard” problem is something like the question about 2-round DES

Quiz Review