CIS 196 midterm review fall 15

advertisement
CS/IS 196 Midterm Review
Midterm: Monday, November 23
Midterm Overview
• Chapters 1 through 12
• Multiple Choice
• Similar to questions at the end of each
chapter and in the homework assignments.
• 50 questions
• You will have the full class time to complete
Chapter 1
Introduction and Security Trends
•
•
•
•
•
•
•
•
•
•
•
•
Critical infrastructures
Elite hackers
Hacker
Hacking
Hacktivist
Highly structured threat
Information warfare
Ping sweep
Port scan
Script kiddies
Structured threat
Unstructured threat
Chapter 2
General Security Concepts
•
•
•
•
•
•
•
•
•
Access control
Authentication
Availability
Confidentiality
Data aggregation
Diversity of defense
Hacking
Host security
Implicit deny
•
•
•
•
•
•
Integrity
Layered security
Least privilege
Nonrepudiation
Phreaking
Security through
Obscurity
• Separation of Duties
• Simple Security Rule
• Social engineering
Chapter 3
Operational and Organizational Security
•
•
•
•
•
•
•
•
•
•
•
Biometrics
Bluetooth
Guidelines
Heating, Ventilation, and Air Conditioning (HVAC)
IEEE 802.11
Physical security
Policies
Procedures
Standards
TEMPEST
Uninterruptible power supply (UPS)
Chapter 4
The Role of People in Security
•
•
•
•
•
•
•
•
Backdoor
Dumpster diving
Phishing
Piggybacking/Tailgating
Reverse social engineering
Shoulder surfing
Social engineering
Vishing
Chapter 5
Cryptography
•
•
•
•
•
•
Algorithm
Block cipher
Collision attack
Cryptanalysis
Cryptography
Digital rights
management
• Hash
•
•
•
•
•
•
•
•
Key
Key escrow
Key management
Keyspace
Multiple encryption
Shared secret
Steganography
Stream cipher
Chapter 6
Public Key Infrastructure (PKI)
• Certificate authority
(CA)
• Certificate revocation
list (CRL)
• Certification practices
statement (CPS)
• Digital certificate
• Dual control
•
•
•
•
•
•
End-entity certificates
Key archiving system
Key escrow
Key recovery
Policy certificate
Public key infrastructure
(PKI)
• Registration authority
(RA)
Chapter 7
Standards and Protocols
• Certificate
• Certificate Authority (CA)
• Certificate Revocation List
(CRL)
• IPsec
• Pretty Good Privacy (PGP)
• Public key infrastructure
(PKI)
• Secure Sockets Layer (SSL)
• Transport Layer Security
(TLS)
• Wired Equivalent Privacy
(WEP)
• Wireless Application
Protocol (WAP)
• Wireless Transport Layer
Security (WTLS)
• X.509
Chapter 8
Physical Security
•
•
•
•
•
•
Access control
Access tokens
Biometrics
BIOS passwords
Bootdisk
Closed circuit television
(CCTV)
• Contactless access cards
• Drive imaging
•
•
•
•
•
•
False negative
False positive
Layered access
LiveCD
Mantrap
Multi-factor
authentication
• Policies and procedures
• Smart cards
• USB devices
Chapter 9
Network Fundamentals
•
•
•
•
•
•
•
•
•
•
•
•
•
Address Resolution Protocol (ARP)
Bus topology
Denial-of-service (DoS)
Domain Name System (DNS)
DMZ
Extranet
Internet Control Message Protocol
(ICMP)
Internet Protocol (IP)
Intranet
Local area network (LAN)
Media Access Control (MAC) address
Network Address Translation (NAT)
Packet
•
•
•
•
•
•
•
•
•
•
•
Ring topology
Routing
Star topology
Storage area network (SAN)
Transmission Control Protocol (TCP)
Trunking
Tunneling
User Datagram Protocol (UDP)
Virtual local area network (VLAN)
VPN concentrator
Wide area network (WAN)
Chapter 10
Infrastructure Security
•
•
•
•
•
•
•
•
•
•
Cloud computing
Coaxial cable
Collision domain
Firewall
Hub
Loop protection
MAC limiting
Modem
Network access control
Network Access Protection
(NAP)
•
•
•
•
•
•
•
•
•
•
•
Network Attached Storage
Network interface card (NIC)
Private branch exchange (PBX)
Router
Servers
Shielded twisted-pair (STP)
Software as a Service (SaaS)
Switch
Unshielded twisted-pair (UTP)
Wireless access point
Workstation
Chapter 11
Authentication and Remote Access
• Authentication, authorization,
and accounting (AAA)
• Access control
• Accounting
• Authentication
• Authentication Header (AH)
• Authentication server (AS)
• Authorization
• Discretionary access control
(DAC)
• Encapsulating Security Payload
(ESP)
• Internet Protocol Security
(IPsec)
• Kerberos
• Layer 2 Tunneling Protocol
(L2TP)
• Mandatory access control
(MAC)
• Point-to-Point Tunneling
Protocol (PPTP)
• Remote Access Server (RAS)
• Role-based access control
(RBAC)
• Rule-based access control
(RBAC)
Chapter 12
Wireless Security
•
•
•
•
•
•
•
•
Beacon frames
Bluejacking
Bluesnarfing
Bluebugging
Confidentiality
IEEE 802.1X
IEEE 802.11
WPA & WPA2
• Service set identifier
(SSID)
• WAP gap
• Wired Equivalent
Privacy (WEP)
• Wireless Application
Protocol (WAP)
• Wireless Transport
Layer Security (WTLS)
The Midterm
• Bring a #2 pencil and an eraser.
• Mr. Hodges will supply the scantron forms.
• Closed book, closed note, closed computer.
Questions
• Any Questions?
Download