IT460 Final Exam Topicsx

feastcanadianΛογισμικό & κατασκευή λογ/κού

14 Δεκ 2013 (πριν από 3 χρόνια και 10 μήνες)

64 εμφανίσεις


-

1
-

IT460 Final Exam Topics

1. General Security

The Enigma Machine

The Founder of the Internet

The CIA Triangle

Social Engineering

Attack Vectors

Forces of Nature

Human Error


2. System Tools

Know the following commands:


chkdsk” , “mem” , “attrib” , “date”
, “time” , “dir /s” “systeminfo” , “tasklist” , “taskkill” ,
“whoami” , “vol” , “ver” , “systeminfo” , “type output.txt”


3. Internet Tools

Know the following Tools:

www.whois.net


www.web
-
sniffer.net

www.whatismyip.org

www.detectmybrowser.com

http://detectmo
bilebrowsers.com

www.whatsmyos.com

www.thismachine.info

www.websitecontentanalysis.com

www.alexa.com

www.checkdomain.com

http://onlinescan.avast.com

4. Network Tools

Know the following Tools:

“ipconfig” , “ping ” , “tracert” , “pathping” , “netstat
” , “nslookup” , “getmac” , “net” , “ftp”

5. Personal Computer Security

Know the following Issues relating to for applying Security

Physical Security

Personal Security

Premises Security

General Hardware Security

Securing PC Components (Hard Drive, CDROM,
Floppy Drive, Keyboard, USB)

Activating Hardware Serial Numbers (CPU Serial Number, Hard Drive Serial Number)

Biometrics (
face,

fingerprint,

hand

geometry,

retina,

iris,

signature,

voice)



-

2
-

6. Operating System Security

Know the following Windows OS Security

Tools

User Logins

User Permissions

Administrator Account

File Access & Permission Levels

Passwords on Files & Folders

Monitoring Processes (Task Manager)

StartUp Configuration (msconfig)

System Registry (regedit)

Windows Event Viewer (
eventvwr.msc
)


7.
Hardware Security

Know the following Hardware Security Techniques

Hardware Key Generators (Pseudo
-
Random
-
Number Generators)

Noise Based Random Number Generators

Nuclear Decay Devices (Random by Nature)

Hardcopy Cryptography (One Time Pads)

Key Distribution
s (Physical Issuing of Keys)

Secure Memory Management

Video Security (Trusted Execution Technology, TET)

Personal Authentications Using Biometrics (finger scanners, eye scanners etc)

8. Batch Programming Using the Windows Command Shell

Know the following B
atch Programming commands

@echo off

echo Enter a Text Message:

set str=SECURITY

for /f "tokens=1,2" %%a in ('tab.bat') do if %char1%==%%a set val1=%%b

SET char5=%str:~4,1%

if %cip1% LSS 0 set /a cip1=(%block1:~0,1%)+10
-
%otp1:~0,1%

rem SET char5=~0,5

pause






9. Data Loss Prevention

Know the following Data Loss Avenues

D.L. through File Systems (deletion, formatting, corruption)

D.L. through Networks (lost packets, poor cabling, sniffing)

D.L. through WiFi (poor coverage, weak signals)

D.L. through
Internet Browsers (page crashes, poor code, compatibility issues)

D.L. through Mobile Devices


Tablets, Mobiles, Notebooks (theft, damage, unauthorized use)


-

3
-

D.L. through Email Systems


Server crashes, email blocked, email deletion

D.L. through Natural Fo
rces


(fire, flooding, lightning)

D.L. through un
-
Natural Forces


(electricity blackouts, hardware failure)


10. Software Security

Know the following Software Security Techniques

Software
Configuration Management

Data Discovery & Protection
-

Data at Rest

& in Motion

User Authentication,
Authorization

& Session Management

Software License Key Generation

Software Authentication

Error Handling,
Logging & Auditing

Software Policies & Procedures


11. Website Security

Know the following cPanel Website Security
Features

Mail



Email Accounts



Spam Assassin & Box Trapper



Email Trace

Files



Backup & Backup Wizard



FTP Account & FTP Session Control



Anonymous FTP

Logs



Latest Visitors



Error Log

Security



Password Protected Directories



IP Deny Manager



HotLink Protection


12. Website Testing

Know the following Website Stress Testing Techniques

Load and Performance Test Tools

Java Test Tools

HTML Validators Link Checkers

Cross
-
browser Testing Tools

Web Site Security Test Tools

External Site Monitoring Services

Web Site
Management Tools

Log Analysis Tools