DOC PREVIEW
Berkeley COMPSCI 161 - COMPSCI 161 Final Review

This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

1Final ReviewDawn [email protected]• Summary of semester• Course evaluation• Final review3What we have covered so far• Introduction to cryptography• Software security• OS security• Web security• Networking security4Three Things to Remeber• Attacker’s mindset• Security is tricky• How to do security evaluation?– Security goal– Threat model– Analysis5Field of Security Is Unique• The security field is unlike any others– Extremely broad– Extremely creative» Think out-of-the box– Game with intelligent attackers• If you want to be celeb over-night ☺6If You’d Like to Learn More• Classes– CS294: Networking Security– CS276: Foundations of Cryptography• Seminar– TRUST security seminar• Security research project7Hope You’ve Enjoyed the Class ☺• Diverse background for students– Students have different backgrounds in math/programming– Students have different interests• Broad field, a lot of material to cover8Thank You for Your Support!• I really enjoyed having you in the class ☺• You all did a great job!• Write down your comments– Particularly if you like the class ☺9Final Review• OS Security• Web Security• Networking Security10OS Security (I)• Principle of least privilege• How to ensure principle of least privilege?– Should only grant privilege necessary– Privilege separation– Drop privilege when possible» Least privilege with Setuid11OS Security (II)• Reference monitor– Properties of reference monitor» Complete mediation» Tamperproof» Small– Properties it enforces: » safety properties» E.g., cannot prevent covert channels– Examples» System call interposition» JVM» SFI» VM12OS Security (III)• SFI– Insert checks to ensure certain properties– Make sure that checks are not by-passed or certain invariants should still hold even when checks are by-passed– Verification• Trusted computing– TCB» Security design principle: minimize TCB– Trusted path– Trusted/authenticated boot» Remote attestation– Secure boot13Web Security• Common vulnerabilities– Input validation vulnerabilities» SQL injection» XSS» HTTP response splitting– CSRF• Same origin policy14Networking Security (I)• Design has wrong trust model• TCP session hijacking• Distributed denial-of-service attacks– SYN flooding– IP spoofing– Reflector attacks• Worms & botnets– How worms propagate– C&C botnets• Measurements: Internet telescope, backscatter15Networking Security (II)• DNS security issues• Firewalls– Stateless firewalls– Stateful firewalls• Attacks & defenses on NIDS16• Guest lecture


View Full Document

Berkeley COMPSCI 161 - COMPSCI 161 Final Review

Documents in this Course
Rootkits

Rootkits

11 pages

Load more
Download COMPSCI 161 Final Review
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view COMPSCI 161 Final Review and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view COMPSCI 161 Final Review 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?