16.01.2015 Views

CS2013-final-report

CS2013-final-report

CS2013-final-report

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• Describe likely attacker types against a particular system.<br />

• Discuss the limitations of malware countermeasures (eg, signature-based<br />

detection, behavioral detection).<br />

• Identify instances of social engineering attacks and Denial of Service attacks.<br />

• Discuss how Denial of Service attacks can be identified and mitigated.<br />

• Describe risks to privacy and anonymity in commonly used applications.<br />

• Discuss the concepts of covert channels and other data leakage procedures.<br />

• Describe the different categories of network threats and attacks.<br />

• Describe virtues and limitations of security technologies at each layer of the<br />

network stack.<br />

• Identify the appropriate defense mechanism(s) and its limitations given a network<br />

threat.<br />

• Discuss security properties and limitations of other non-wired networks.<br />

• Define the following terms: cipher, cryptanalysis, cryptographic algorithm, and<br />

cryptology and describe the two basic methods (ciphers) for transforming plain<br />

text in cipher text.<br />

• Discuss the importance of prime numbers in cryptography and explain their use<br />

in cryptographic algorithms.<br />

• Use cryptographic primitives and their basic properties.<br />

IM<br />

Core-Tier1:<br />

• Describe how humans gain access to information and data to support their needs.<br />

• Understand advantages and disadvantages of central organizational control over<br />

data.<br />

• Identify the careers/roles associated with information management (e.g., database<br />

administrator, data modeler, application developer, end-user).<br />

• Demonstrate uses of explicitly stored metadata/schema associated with data.<br />

• Identify issues of data persistence for an organization.<br />

Core-Tier2:<br />

• Explain uses of declarative queries.<br />

• Give a declarative version for a navigational query.<br />

• Identify vulnerabilities and failure scenarios in common forms of information<br />

systems.<br />

• Describe the most common designs for core database system components<br />

including the query optimizer, query executor, storage manager, access methods,<br />

and transaction processor.<br />

• Describe facilities that databases provide supporting structures and/or stream<br />

(sequence) data, e.g., text.<br />

• Compare and contrast appropriate data models, including internal structures, for<br />

different types of data.<br />

• Describe the differences between relational and semi-structured data models.<br />

• Give a semi-structured equivalent (e.g., in DTD or XML Schema) for a given<br />

relational schema.<br />

- 217 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!