16.01.2015 Views

CS2013-final-report

CS2013-final-report

CS2013-final-report

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Learning outcomes:<br />

[Core-Tier2]<br />

1. Describe the purpose of cryptography and list ways it is used in data communications. [Familiarity]<br />

2. Define the following terms: cipher, cryptanalysis, cryptographic algorithm, and cryptology, and describe<br />

the two basic methods (ciphers) for transforming plain text in cipher text. [Familiarity]<br />

3. Discuss the importance of prime numbers in cryptography and explain their use in cryptographic<br />

algorithms. [Familiarity]<br />

4. Explain how public key infrastructure supports digital signing and encryption and discuss the<br />

limitations/vulnerabilities. [Familiarity]<br />

[Elective]<br />

5. Use cryptographic primitives and describe their basic properties. [Usage]<br />

6. Illustrate how to measure entropy and how to generate cryptographic randomness. [Usage]<br />

7. Use public-key primitives and their applications. [Usage]<br />

8. Explain how key exchange protocols work and how they fail. [Familiarity]<br />

9. Discuss cryptographic protocols and their properties. [Familiarity]<br />

10. Describe real-world applications of cryptographic primitives and protocols. [Familiarity]<br />

11. Summarize security definitions related to attacks on cryptographic primitives, including attacker<br />

capabilities and goals.[Familiarity]<br />

12. Apply appropriate known cryptographic techniques for a given scenario. [Usage]<br />

13. Appreciate the dangers of inventing one’s own cryptographic methods. [Familiarity]<br />

14. Describe quantum cryptography and the impact of quantum computing on cryptographic algorithms.<br />

[Familiarity]<br />

IAS/Web Security<br />

[Elective]<br />

Topics:<br />

• Web security model<br />

o Browser security model including same-origin policy<br />

o Client-server trust boundaries, e.g., cannot rely on secure execution in the client<br />

• Session management, authentication<br />

o Single sign-on<br />

o HTTPS and certificates<br />

• Application vulnerabilities and defenses<br />

o SQL injection<br />

o XSS<br />

o CSRF<br />

• Client-side security<br />

o Cookies security policy<br />

o HTTP security extensions, e.g. HSTS<br />

o Plugins, extensions, and web apps<br />

o Web user tracking<br />

• Server-side security tools, e.g. Web Application Firewalls (WAFs) and fuzzers<br />

Learning outcomes:<br />

1. Describe the browser security model including same-origin policy and threat models in web security.<br />

[Familiarity]<br />

- 108 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!