CSCI – 620
Spring 2017
Topics for Final Exam
No. / Topics / Where is answer located1 / What is an ACL? What is AC Matrix / 02
2 / Classify threats / 01
3 / Policies and Mechanisms / 01
4 / Goals of Security / 01
5 / Trust and Assumptions / 01
6 / Classify mechanisms / 01
7 / Define assurance / 01
8 / List operational and human issues / 01
9 / Define VMM / 29
10 / Conditions for VM architecture implementation / 29
11 / VM problems / 29
12 / Confidentiality policy goal / 05
13 / Bell-LaPadula Model / 05
14 / Simple Security Condition, *-Property and Basic Security Theorem (Step 1) / 05
15 / Simple Security Condition, *-Property and Basic Security Theorem (Step 2) / 05
16 / Objects and Tuples / 05
17 / Principle of Tranquility / 05
18 / †-Property / 05
19 / Integrity policies / 06
20 / Requirements of policies / 06
21 / BIBA integrity model / 06
22 / Low Water Mark policy, Ring policy, and Strict Integrity Policy / 06
23 / Clark-Wilson Integrity Model / 06
24 / Chinese-Wall Model / 07
25 / Clinical Information System Security / 07
26 / ORCON / 07
27 / RBAC / 07
28 / Authentication and authentication system / 11
29 / Password / 11
30 / Password Attacks / 11
31 / User Security; Access, Passwords, Login Procedure, Leaving the system; System access issues, File and device issues, Process management issues, Electronic communications issues / 25
32 / Access Control Mechanism / 14
33 / ACLs and C-lists / 14
34 / Locks and Keys / 14
35 / Shamir’s Scheme / 14
36 / Ring-Based Access Control / 14
37 / Propagated Access Control Lists (PACLs) / 14
38 / What is vulnerability? / 20
39 / Formal Verification / 20
40 / Penetration Testing / 20
41 / Penetration Studies: Goals / 20
42 / Layering of Tests / 20
43 / Methodology / 20
44 / Flaw Hypothesis Methodology / 20
45 / Vulnerability Classification / 20
46 / Audit system infrastructure / 21
47 / Network Security / 23
48 / Network Organization / 23
49 / Security Appliances / 23
50 / Defense-in-Depth / 23
51 / System Security / 24
52 / Security Policies / 04
53 / Confidentiality, Integrity, Availability / 04
54 / Trust / 04
55 / Secure, Precise mechanisms / 04
56 / Existence Theorem / 04
57 / Relationship among Policy, Mechanism and Trust / 04
58 / Define a cryptosystem / 08
59 / Attacks on cryptosystems / 08
60 / Public-key Cryptography definition, requirements and examples / 08
61 / Security Services / 08
62 / Cryptographic Checksums definition, types, examples / 08
63 / Session, Interchange Keys / 9
64 / Key Exchange Algorithms / 9
65 / Kerberos / 9
66 / Public-key Exchange / 9
67 / Key generation / 9
68 / Random vs Pseudorandom number generation / 9
69 / Cryptographic key infrastructure / 9
70 / Certificates / 9
71 / Key revocation, CRLs / 9
72 / Digital Signatures / 9
73 / Cypher Types, Encipherment functions / 10
74 / Stream cyphers, LFSR, NLFSR / 10
75 / Block cyphers, Cypher block chaining, Double and triple encipherment / 10
76 / Link Protocol, End-to-End protocol / 10
77 / Identity: terms and definitions / 13
78 / Files and Objects / 13
79 / Users / 13
80 / Multiple Identities / 13
81 / Groups / 13
82 / Roles / 13
83 / Naming and Certificates; CAs and Policies; Types of Certificates; Certificates for roles; Persona Certificate / 13
84 / Domain Name Server (DNS), Reverse Domain Lookup / 13
85 / Dynamic Identifiers, DHCP, Gateways / 13
86 / Weak Authentication / 13
87 / DNS Security Issues / 13
88 / Malicious Logic – Definition, Types, Defenses, Examples / 19 + Rootkits + Backdoors + Logic bombs
89 / Networks / Network review
90 / OSS extras / OSS presentations
91 / Extended Euclidian Algorithm / 28