Midterm Exam
The midterm exam date is Oct 23.
Study Guide
Study the examples from the slides. Also, look into the homework questions. The exam will have 10 questions.
- CIA triad
- System access and authentication
- vulnerability, threat and control
- Information security threats
- 7-layer OSI models
- TCP
- UDP
- IP Addresses and Subnetting
- Buffer Overflow
- Denial of Service attack
- Stages of Hacking
- Port Scanning
- Buffer Overflows
- IP Spoofing
- Denial-of-Service Attacks
- ARP Poisoning
- DNS Poisoning
- Eavesdropping
- Session Hijacking
Final Exam
The final exam date is TBA.
Study Guide
Study the examples from the slides. Also, look into the homework questions. The exam will have 12 questions.
Web Security
-
Malicious web content
- Fake code
- Substitute content
- Web bug
- Clickjacking
- Drive-by download
-
Obtaining user or website data
- Cross-site scripting
- SQL injection
- Dot-dot-slash
- Server-side include
-
E-mail and instant messaging security
- E-mail structure
- Fake email/ spoofing
- Link manipulation
- Malicious attachments
- Spam
- Social engineering
- Phishing
- Spear phishing
- Vishing
- Email do's and don'ts
Malicious Code
- Viruses
- Worms
- Polymorphic malware
- Trojan horses
- Rootkits
- Logic bombs
- Spyware
- Adware
- Botnets
- Backdoors and trapdoors
- Ransomware
- Malware defenses
- Cryptography
-
Introduction
- Basic Terminology
- Cryptosystem
- Classical Cryptography
-
Transposition Techniques
- Rail Fence Cipher
- Interleaving Transposition Cipher
-
Substitution Techniques
- Caesar Cipher
- Monoalphabetic Cipher
- Polyalphabetic Cipher
- Playfair Cipher
- Vigenere Cipher
- One time pad (vernam) Cipher
-
Cryptographic Hash Function
- One-way Hash Function Properties
- Hashing Methodologies