CS 459/559 - FINAL STUDY GUIDE

FORMAT

CONTENT

Chapters 1-21; Homework, Labs

  1. What Have You Got to Lose?
    1. Accessing Security Needs (3-4)
    2. Policy Document (5-8)
      • Passwords
      • Guidelines
    3. Types of Security (15-26)
      • Internet
      • Network
      • Physical
    4. 56 bit vs. 128 bit encryption (30-31)
  2. Implementing a Security Policy
  3. Disaster Planning
    1. Automated Data Backup (55-59)
    2. Hierarchical Storage Management (60-61)
  4. Security Levels
    1. Trusted Computer System Evaluation Criteria (Orange Book)
    2. Class A, B, C, D
    3. C2 (67-70)
    4. Discretionary Access Control (70-71)
  5. Encryption
    1. Public (asymmetric) and Private (symmetric) Key (76-82)
    2. Digital Certificates (84-89)
  6. Security Systems of Network Operating Systems
    1. Netware Security Features (102-114)
    2. NT Security Features (114-120)
      • Registry
      • Security Settings
      • Securing an NT Server
      • Breaking into an NT Server
    3. UNIX Security Features (120-127)
  7. Security Management Platforms
    1. Systems Management Standards (136-139)
  8. Network Monitors and Other Security Programs
    1. Monitoring a Web Server (154-156)
    2. Application Management (158-159)
    3. Proxy Servers (159-160)
    4. Risk Analysis Tools (160-162)
  9. Security Audits
    1. Auditing Process (173-177)
  10. Remote Access & Remote Control
  11. Virtual Networking
  12. Firewalls
  13. Security Devices (face recognition, theft recovery, web site blocking tools, physical security devices)
  14. Redundancy
  15. Preventing Telephone Fraud
  16. Securing Your Web Connection (S-HTTP, SSL, Java vs. ActiveX)
  17. Viruses
  18. Ensuring Secure Electronic Commerce
  19. Intranets
  20. Identifying and Preventing Common Attacks
  21. Security and TCP/IP Services
  22. Security Standards and Protocols
  23. Secure Shell Program (Installing and Using)
  24. ***Security Policy***
TERMINOLOGY
data remanencedegaussingPGP
Trojan horsesnifferCERT
cold sitehot sitedump
tardiscretinary access controlACL
access control matrixaudit capabilitydigital signatures
authenticationnonrepudiationDES
RSADiffie-HellmanIDEA
hashX.509Certificate Authority
KerberosVerisignelectronic postmark
SATANDMISNMP
MIBHP OpenViewSolstice Domain Manager
proxy serverCIAC
RASVLANVPN
data sniffingdata tamperingDoS attack
packet filteringIPSECSKIP
DMZsmart cardsdongle (HASP)
disk duplexingdisk mirroringdisk striping
RAIDS-HTTPSSL
Cookiesvirusworm
Trojan horsetime bomblogic bomb
polymorphic virusstealth virusmacro virus
Brute ForceSYNIPv6
IPSec
To Table of Contents