CS 257 - Fall 2020.


[Home]

Welcome to CS 257!

Video of the day

Unsolved! History of Ciphers Craig Bauer

Thought for the day

MIRL NCT PLMK AFAIK CUL8R

Playfair Cypher Used by PT-109 in WWII.

Lecture 12: Access Control. Networking. 10/12

Administrivia

  • Office hours (via zoom. Meeting ID 459 434 2854): Wednesday 4 to 6 pm, and by appointment.

  • The zoom meetings now require a passcode. See piazza.

  • Homework assignments: [Assignments]. hw4 is now available.

    Midterm Exam: Wednesday October 14

    The exam will be an open book, timed, online Canvas quiz. You will have an hour and half (90 mintutes) to take the exam. The exam will be available for 8 hours, from 10am to 6pm EDT. You may take it anytime within that window.

    It covers chapters 2, 3, and 4. Questions will be from problems at the end of each chapter, or at least similar to those. There are 13 questions, worth 10 points each. You need to answer only 10, for a possible total of 100 points. There are no coding questions.

    Lecture

    Access Control: Chapter 8 Authorization

  • slides: chapter 8 (actually 7-8) (slide 122 Firewalls)
  • slides: chapter 8 4 up

    Networks (Appendix)

  • slides: appendix (network slide 1)
  • slides: appendix 4 up

  • SMTP spoof

  • IPv6

  • HTTP Cookies

  • Chrome cookie settings

  • networking ports detailed port numbers (check out port 1984)

  • QUIC Google's transport layer protocol built on UDP (User Datagram Protocol)

  • ping send ICMP ECHO_REQUEST to network hosts
    ping -c 4 -U viper.cs.yale.edu
    arping viper.cs.yale.edu
    

  • IPv6

  • firewalk

  • Machine Learning and Data Mining for Computer Security Maloof. Focus on intrusion detection.


    [Home]