Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security Revision Week

Similar presentations


Presentation on theme: "Computer Security Revision Week"— Presentation transcript:

1 Computer Security Revision Week
Delivered by: Dr Leila Musavian

2 General guides Lecture slides are important Revise example questions
Revise past papers This revision is to give you guides for each week material

3 Week 16 Summary Things to know very well What I will not ask about
Virus definition and characteristics what are the targets of viruses Ways a virus will attach to a program. How it works? Their comparisons What is Stealth Virus? What is Polymorphic virus? Prevention System and data recovery What I will not ask about Specific questions about particular viruses, e.g., What is Melissa and how it works?

4 Week 17 Summary Things to know very well
Malware, Trojans, worms, and trapdoor definition, behaviour, protection (as much as there is in the slides) Rootkit (definition, how it works, detection and removal) XSS (definition, the two types, how it works, its dangers)

5 Week 17, Part II Risk analysis Security goals
Different steps Being able to calculate Security goals Definition What I will not ask about Questions about specific examples of malwares that are covered in the lecture slides, e.g., Zeus trojan

6 Week 18 Things to know very well What I will not ask about
General understanding of cryptography, How Brute forth attack works What is symmetric block cipher Different type of symmetric block cipher, e.g., Caesar, Vigenere, What is a substitution cipher Frequency analysis for an attack on a ciphertext Symmetric and asymmetric keys What I will not ask about Ascii codes

7 Week 19 Things to know very well What I will not ask about
Shift cipher, stream cipher and block cipher AND, OR and XOR Permutation What I will not ask about Differential cryptanalysis

8 Week 20 Things to know very well What I will not ask about
Confusion and diffusion S-Box General characteristics of DES, triple DES and AES What I will not ask about Remembering all the steps of the baby DES What year a certain cryptography was designed.

9 Week 21 Things to know very well What I will not ask about
Public key cipher What is the public key, what is the private key? RSA Man-in-the middle attack What I will not ask about What mathematical function can be used in RSA The slides in Lecture 21 on Message authentication

10 Week 22 Things to know very well All of it

11 Week 23 Things to know very well What I will not ask about
Three different methods of user authentication, examples, advantages, disadvantages (some of them are in week 24 slides) Hash or checksum The four characteristics of Cryptography checksums Birthday attack What I will not ask about Other names of checksum or hash? What is MD5 Rainbow attack

12 Week 24 Things to know very well What I will not ask about
Three different methods of user authentication, examples, advantages, disadvantages (some of them are in week 23 slides) Challenge response authentication Attacks against passwords What I will not ask about Choosing password

13 Week 24-Part II Things to know very well
Malicious code vulnerabilities and non-malicious code vulnerabilities Cross-site Scripting (XSS) SQL Injection Buffer Overflow Setuid Security in operating systems Objects Sharing resources Access control methods

14 Week 24-Part II What I will not ask about
How memory is organized for a process What is the stack (I will not ask you to explain what is stack, but if you want to explain about buffer overflow vulnerability, you may want to refer to stack)

15 Week 25 Summary We summarized one of the past year exam, how to solve each question, how the marks are allocated.


Download ppt "Computer Security Revision Week"

Similar presentations


Ads by Google