Lecture 19 Outline

Reading: §12.3, 12.4.2, 26
Due: Lab 3, due on May 23, 2018 at 11:59pm; Homework 4, due on May 25


  1. Networks and ciphers
    1. Where to put the encryption
    2. Link vs. end-to-end
  2. TLS and SSL
    1. Session, connection
    2. Cryptographic mechanisms
    3. Lower layer: TLS record protocol
    4. Upper layer
      1. TLS handshake protocol
      2. TLS change cipher spec protocol
      3. TLS alert protocol
      4. TS heartbeat extension
      5. TLS application protocol
    5. TLS vs. SSLv3
  3. Firewalls
    1. Why use them?
    2. Packet-level or filtering firewalls
    3. Application layer or proxy firewalls
  4. Network organization
    1. Inside/outside
    2. Inside/DMZ/outside
    3. How email and web services (and others) are handled
  5. Denial of service attacks
    1. SYN cookies
    2. Adaptive time-out
  6. Domain Name Service
    1. Weak authentication
    2. Reverse name lookup
    3. Attacks
    4. DNSSEC


UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: [email protected]
ECS 153, Computer Security
Version of May 14, 2018 at 1:19AM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh