This is a brief description of the topics we covered in class that either were not discussed in your textbook or were not highlighted enough in the text

superfluitysmackoverΑσφάλεια

23 Φεβ 2014 (πριν από 3 χρόνια και 8 μήνες)

74 εμφανίσεις

This is a brief description
of

the topics we covered in class that either
were not discussed in your textbook or were not highlighted enough in
the text



1.

How to compute the total number of trials in brute force attacks.

2.

Details of buffer overflow attacks.

3.

Accurate description of the birth day attack.

4.

Various types of
Man
-
in
-
the
-
Middle Attacks
.

5.

Details of
TCP/IP Hijacking
attacks

6.

The technicalities of how different DoS attacks are conducted.

7.

Defense in Depth.

8.

More on various biometric authentication techniq
ues.

9.

How Kerberos work in simple environment

10.

Virus propagation through
terminate
-
and
-
stay
-
resident

programs
.

11.

Details of how DNS servers work
.

12.

Details of various types of FTP server (simple, blind, etc.) and security measures to
secure the FTP service
.

13.

Deta
iled differenced among various types of memories. ROM, RAM, PROM,
EPROM, and EEPROM.

14.

How ACL by composed, deployed, and used on a router
.

15.

Advantages and disadvantages of various types of communication media whether
wired of wireless.

16.

Basics working princip
als of single bus LANs.

17.

The function of switches.

18.

Differences between switches and hubs.

19.

Details regarding IDS (types, detection strategies, advantages and disadvantages, etc.)
.

20.

Details of NAT and PAT

21.

Details of Macros and web
-
embedded scripts
.

22.

Various typ
es of encryption technique
s

to secure email and other services.
Advantages and disadvantages of each type.

23.

Server
-
side and client
-
side programming. Differences and applications.

24.

The need for cookies and various security issues with respect to them.

25.

Basics
of the FTP service.

26.

Basics of the SSH service.

27.

IPSec and why it is needed.

28.

VPNs

29.

Basics of the cellular phone service.

30.

The WAP gap problem

31.

Details of hashing, symmetric encryption, and asymmetric encryption