160 likes | 330 Views
CS/IS 196 Midterm Review Fall 2014. Midterm: Monday, November 17. Midterm Overview. Chapters 1 through 12 Multiple Choice Similar to questions at the end of each chapter and in the homework assignments. 50 questions You will have the full class time to complete.
E N D
CS/IS 196 Midterm ReviewFall 2014 Midterm: Monday, November 17
Midterm Overview • Chapters 1 through 12 • Multiple Choice • Similar to questions at the end of each chapter and in the homework assignments. • 50 questions • You will have the full class time to complete
Chapter 1Introduction and Security Trends • Critical infrastructures • Elite hackers • Hacker • Hacking • Hacktivist • Highly structured threat • Information warfare • Ping sweep • Port scan • Script kiddies • Structured threat • Unstructured threat
Chapter 2General Security Concepts • Access control • Authentication • Availability • Confidentiality • Data aggregation • Diversity of defense • Hacking • Host security • Implicit deny • Integrity • Layered security • Least privilege • Nonrepudiation • Phreaking • Security through Obscurity • Separation of Duties • Simple Security Rule • Social engineering
Chapter 3Operational and Organizational Security • Biometrics • Bluetooth • Guidelines • Heating, Ventilation, and Air Conditioning (HVAC) • IEEE 802.11 • Physical security • Policies • Procedures • Standards • TEMPEST • Uninterruptible power supply (UPS)
Chapter 4The Role of People in Security • Backdoor • Dumpster diving • Phishing • Piggybacking/Tailgating • Reverse social engineering • Shoulder surfing • Social engineering • Vishing
Chapter 5Cryptography • Algorithm • Block cipher • Collision attack • Cryptanalysis • Cryptography • Digital rights management • Hash • Key • Key escrow • Key management • Keyspace • Multiple encryption • Shared secret • Steganography • Stream cipher
Chapter 6Public Key Infrastructure (PKI) • Certificate authority (CA) • Certificate revocation list (CRL) • Certification practices statement (CPS) • Digital certificate • Dual control • End-entity certificates • Key archiving system • Key escrow • Key recovery • Policy certificate • Public key infrastructure (PKI) • Registration authority (RA)
Chapter 7Standards and Protocols • Certificate • Certificate Authority (CA) • Certificate Revocation List (CRL) • IPsec • Pretty Good Privacy (PGP) • Public key infrastructure (PKI) • Secure Sockets Layer (SSL) • Transport Layer Security (TLS) • Wired Equivalent Privacy (WEP) • Wireless Application Protocol (WAP) • Wireless Transport Layer Security (WTLS) • X.509
Chapter 8Physical Security • Access control • Access tokens • Biometrics • BIOS passwords • Bootdisk • Closed circuit television (CCTV) • Contactless access cards • Drive imaging • False negative • False positive • Layered access • LiveCD • Mantrap • Multi-factor authentication • Policies and procedures • Smart cards • USB devices
Chapter 9Network Fundamentals • Address Resolution Protocol (ARP) • Bus topology • Denial-of-service (DoS) • Domain Name System (DNS) • DMZ • Extranet • Internet Control Message Protocol (ICMP) • Internet Protocol (IP) • Intranet • Local area network (LAN) • Media Access Control (MAC) address • Network Address Translation (NAT) • Packet • Ring topology • Routing • Star topology • Storage area network (SAN) • Transmission Control Protocol (TCP) • Trunking • Tunneling • User Datagram Protocol (UDP) • Virtual local area network (VLAN) • VPN concentrator • Wide area network (WAN)
Chapter 10Infrastructure Security • Cloud computing • Coaxial cable • Collision domain • Firewall • Hub • Loop protection • MAC limiting • Modem • Network access control • Network Access Protection (NAP) • Network Attached Storage • Network interface card (NIC) • Private branch exchange (PBX) • Router • Servers • Shielded twisted-pair (STP) • Software as a Service (SaaS) • Switch • Unshielded twisted-pair (UTP) • Wireless access point • Workstation
Chapter 11Authentication and Remote Access • Authentication, authorization, and accounting (AAA) • Access control • Accounting • Authentication • Authentication Header (AH) • Authentication server (AS) • Authorization • Discretionary access control (DAC) • Encapsulating Security Payload (ESP) • Internet Protocol Security (IPsec) • Kerberos • Layer 2 Tunneling Protocol (L2TP) • Mandatory access control (MAC) • Point-to-Point Tunneling Protocol (PPTP) • Remote Access Server (RAS) • Role-based access control (RBAC) • Rule-based access control (RBAC)
Chapter 12Wireless Security • Beacon frames • Bluejacking • Bluesnarfing • Bluebugging • Confidentiality • IEEE 802.1X • IEEE 802.11 • WPA & WPA2 • Service set identifier (SSID) • WAP gap • Wired Equivalent Privacy (WEP) • Wireless Application Protocol (WAP) • Wireless Transport Layer Security (WTLS)
The Midterm • Bring a #2 pencil and an eraser. • Mr. Hodges will supply the scantron forms. • Closed book, closed note, closed computer.
Questions • Any Questions?