Midterm Exam Review • Release questions via webcourse “assignment” around 2pm, Monday Feb. 20th, due via webcourse at 2pm, next day • Submit format: – Word file, PDF file – Scanned answer sheets • Make sure your writing is large and readable, file names show page number – Photos of your answer sheets if you have no scanner • Make sure it is readable, file names show page number • You can resubmit, so submit first version early! – Don’t wait until the last one hour to submit! – No excuse of not being able to submit! (unless webcourse is down for the all day on Feb. 21st) • From 2pm to 3:45pm on Monday, you can call me for any questions related to exam problems – Office number: 407-823-5015 (HEC 243) Exam Coverage • All questions in previous two homework • All examples given in this review lecture • Covers until buffer overflow attack and defense lectures • Try to go over my lecture notes – Use textbook as reference Question Types – Knowledge questions – True or false statement (explain why) – Protocols – Calculations – All questions in Homework 1 and Homework 2 Knowledge Question Examples • Difference between TCP and UDP? • How many layers in computer networking? • TCP packet header size? UDP packet header size? IP packet header size? • What service port used by DNS, HTTP, SMTP, SSH? • TCP or UDP are normally used in which applications (HTTP, SMTP, DNS, VOIP, etc)? • What are the differences between public/symmetric key cryptography? The advantage and disadvantage of each? • What is RFID? Compared with bar code, what are its advantages? Knowledge Question Examples • Ethernet switch checks what layer’s header? How about routers? • What are the several private IP blocks? • What are the three security goals? • Why most password-based login need at least 8 characters? • What is message digest? Digital signature? What is digital certificate? • What does “rwx” represent in Unix file system? Folder? • What are the two types of VM? Examples? • What is “salt” used in OS password? • What does subnet a.b.c.d/n mean? Protocol Problem Examples – TCP syn/ack number changes in a connection • Homework 1 – TCP three-way connection setup procedure • SYN, SYN/ACK, ACK and changes of seq/ack number – Homework 1 – Two parties communication with certain security requirements: • Confidentiality, integrity/authentication Calculation Problem Examples • Cipher text computation: – Caesar cipher, Vigenere cipher, Hill cipher • Modular power computation • Euclid’s GCD Algorithm • Point out where is the vulnerability in a given code – buffer overflow, integer overflow, format string