CS 257 - Fall 2020.
[Home]
Welcome to CS 257!
Video of the day
Unsolved! History of Ciphers Craig Bauer
Thought for the day
MIRL NCT PLMK AFAIK CUL8R
Playfair Cypher
Used by PT-109 in WWII.
Lecture 12: Access Control. Networking. 10/12
Administrivia
Office hours (via zoom. Meeting ID 459 434 2854): Wednesday 4 to 6 pm,
and by appointment.
The zoom meetings now require a passcode. See piazza.
Homework assignments:
[Assignments]. hw4 is now available.
Midterm Exam: Wednesday October 14
The exam will be an open book, timed, online Canvas quiz. You will have an hour and half (90 mintutes) to take the exam.
The exam will be available for 8 hours, from 10am to 6pm EDT. You may take it anytime within that window.
It covers chapters 2, 3, and 4. Questions will be from problems at
the end of each chapter, or at least similar to those. There are 13 questions, worth 10 points each. You need to answer only 10, for a possible total of 100 points. There are no coding questions.
Lecture
Access Control: Chapter 8 Authorization
slides: chapter 8 (actually 7-8) (slide 122 Firewalls)
slides: chapter 8 4 up
Networks (Appendix)
slides: appendix (network slide 1)
slides: appendix 4 up
SMTP spoof
IPv6
HTTP Cookies
Chrome cookie settings
networking ports
detailed port numbers (check out port 1984)
QUIC Google's transport layer protocol built on UDP (User Datagram Protocol)
ping send ICMP ECHO_REQUEST to network hosts
ping -c 4 -U viper.cs.yale.edu
arping viper.cs.yale.edu
IPv6
firewalk
Machine Learning and Data Mining for Computer Security Maloof. Focus on intrusion detection.
[Home]