Computer Security ECS 153
Popular in Course
Popular in Engineering Computer Science
This 2 page Study Guide was uploaded by Ashleigh Dare on Tuesday September 8, 2015. The Study Guide belongs to ECS 153 at University of California - Davis taught by Staff in Fall. Since its upload, it has received 75 views. For similar materials see /class/191691/ecs-153-university-of-california-davis in Engineering Computer Science at University of California - Davis.
Reviews for Computer Security
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 09/08/15
STUDY GUIDE FOR FINAL ECS 153 7 FALL 2003 Study Guide for Final This is simply a guide of topics thatI consider fair game for the nal I don t promise to ask you about them all or about any of these in particular but I may very well ask you about any of these 19 Version of December 5 2003 102 pm Anything from the Study Guide farMidterm Identity a UNIX real effective saved audit Ule b Host names and addresses c Cookies and state d Anonymous rem ailers Access Control a Multiple levels of privilege b UNIX protection scheme c M39ULTICS ring protection scheme d ACLs capabilities lockandkey Information ow a De nition b Compilertime analysis c Executiontime analysis Assurance a Role of evidence in assurance b Importance of requirements and speci cation c Assurance and the software life cycle Computerized Vermin a Trojan horse computer virus b Computer worm c Bacteria logic bomb d Defenses Penetration Studies a Flaw Hypothesis Methodology b Using vulnerabilities models Vulnerabilities Models a RISOS b PA c Aslam Page I of I ECS 153 Introduction to Computer Security Spring Quarter 2005 Study Guide for Final This is simply a guide of topics thatI consider fair game for the nal I don t promise to ask you about them all or about any of these in particular but I may very well ask you about any of these 1 2 09quot Last changed on June 11 2005 at 736 am Anything from the Study Guide for Midterm Key Distribution Protocols a Kerberos and NeedhamiSchroeder b Certi cates and public key infrastructure Passwords selection storage attacks aging Oneiway hash functions cryptographic hash functions UNIX password scheme what the salt is and its role Password selection aging Challengeiresponse schemes Attacking authentication systems guessing passwords spoo ng system countermeasures 0997 Access Control a Access control matrix b Multiple levels of privilege c UNIX protection scheme d MULTICS ring protection scheme e ACLs capabilities lockiandikey Assurance Computerized Vermin a Trojan horse computer virus b Computer worm c Bacteria logic bomb d Countermeasures Penetration Studies a Flaw Hypothesis Methodology b Using vulnerabilities models Vulnerabilities Models a RISOS b PA c Aslam Vulnerabilities a Unknown interaction with other system components b Over ow c Race conditions d Environment variables e Not resetting privileges Page 1 of 1
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'