SCSC 455 Study Guide

advertisement
SCSC 455 Study Guide
Note: This is a list of KEY topics of each chapter. However, this list does NOT cover all topics covered in
this course.
Chapter 1
1. Model for network security
2. Some key objectives of information security
3. The importance of computer security to both companies and nations
4. Passive attack vs. active attack
5. Categories of security service
6. Two specific authentication services
7. Information security standards
8. Risk and risk assessment
9. Is “Security through obscurity” a good approach to information security? Why?
10. Definition of backdoor
11. social engineering
12. insider vs. outsider
13. IT security certifications introduced in this course
14. Ten domains of Common Body of Knowledge defined in CISSP
Chapter2
1. Kerckhoff’s Principle
2. Different ways of classify Cryptographic systems
3. Five types of attacks on encrypted messages
4. Notation of Computationally Secure
5. Feistel Cipher Structure
6. DES history, basics and controversy
7. Modes of operation in DES: especially CBC mode, CFB mode, and CTR mode
8. Meet-in-the-middle attack
9. 3DES and its operation modes
10. AES history and basics
1
11. The basics of encryption methods in history covered in lectures
12. Mono-alphabetic vs Poly-alphabetic substitution cipher
13. Correlation in statistical attack
14. Key space in Exhaustive search
15. password cracking tool and method (Lab)
16. Frequency analysis
17. Method that breaks Vigènere Cipher
18. Basics of Enigma Machine
19. Requirements for Random and Pseudorandom Numbers
20. TRNG, PRNG, and PRF
21. stream cipher basics, pros and cons
22. RC4 procedure and pseudocode
23. OTP
24. Why OTP is not used as primary cryptosystem
25. Steganography basics
26. null cipher
27. digital watermark
28. LSB method (Lab)
Chapter 3
1. Message authentication code
2. Message authentication using conventional encryption, using public-key encryption, and using
secret value
3. The difference between authentication algorithm and encryption
4. Six properties of hash function
5. Birthday paradox and its implication in hash function
6. Two simple Hash functions
7. Basics of MD5 and SHA
8. Message digest generation using SHA-512 (append padding bits and append length are required.
The detail of F module is not required)
9. Basics of asymmetric cryptography
2
10. pros and cons of asymmetric and symmetric cryptography
11. Diffie-Hellman algorithm in detail
12. The basics of RSA algorithm
13. Man-in-the-middle attack
14. Hybrid cryptosystem, which include digital signature
3
Download