Study Guide for Final
This is simply a guide of topics that I consider fair game for the
final. I don't promise to ask you about them all, or about any of
these in particular; but I may very well ask you about any of these.
- Anything from the Study Guide for Midterm
- Identity
- UNIX real, effective, saved, audit UIDs
- Host names and addresses
- Cookies and state
- Anonymous remailers
- Access Control
- Multiple levels of privilege
- UNIX protection scheme
- MULTICS ring protection scheme
- ACLs, capabilities, lock-and-key
- Information flow
- Definition
- Compiler-time analysis
- Execution-time analysis
- Assurance
- Role of evidence in assurance
- Importance of requirements and specification
- Assurance and the software life cycle
- Computerized Vermin
- Trojan horse, computer virus
- Computer worm
- Bacteria, logic bomb
- Defenses
- Penetration Studies
- Flaw Hypothesis Methodology
- Using vulnerabilities models
- Vulnerabilities Models
- RISOS
- PA
- Aslam
Here is a PDF version of this document.