TKK |
Networking Laboratory
| Studies
| S-38.153
Example questions for S-38.153, spring 2005
Following questions are examples of possible exam questions. These
questions are not provided as reading guidance but as an example of
what kind of questions there will be.
The list is underway, so more questions will be provided later.
- What are three components in information security
- Using five-step evaluation of security mechanism, evaluate following
mechanisms (firewall, smart card, fingerprint reader, ...) in
following usage scenarios (company internal network, AAA system,
disk encryption,...)
- What assets (a company selling goods over internet, stock broker,..)
has to protect
- Consider (mobile operator, access to call records,...). What kind
of mechanisms whould be implemented for prevent-detect-respond/recover?
- See (additional material; news item). Why security failed?
- Why system security may not improve if a new security mechanism is
implemented?
- What kind of relation there is between security policy,
specification, assurance and implementation.
- You need to decide sufficient security for (customer database,
warehouse db, bookkeeping db,...). What kind analysis you would
select?
- Consider assets in following table. Rank each column (conf, int,
avail) from 5 to 1 (ultimate importanatance to marginal importance).
- Why denial of service is hard to protect from in current Internet?
- To defeat phishing, it has been proposed that common sites start
sending their email signed. Why you think this has not taken place?
- Consider security requirements for medical records. Some proposals
have been embedding health information to smart card where it can be
read by physicians. How this relates to centralised database? What
are strengths and weaknees of each method?
- You are buying a new GPS receiver from previously unknown shop from
Internet using your credit card. What kind assumptions you make
about security? How about if you are buing with advance bank
transfer? What kind of possibilities you have to confirm
assumptions.
- Why mandatory access control may not work as generic access control
method?
- Explain Kerckhoffs desing principles for encryption system
- What are desing principles for encryption
- Why stream chiphers are popular in communications?
- Why asymmetric chiphers are slow?
- Explain different usage modes for block chipers? Give some scenario
for each mode.
- Why message digest algorithms are imporant?
- Encryption can be on several layers of communication. Give
strengths and weaknees of each level.
- Why PKI is not widely deployed.
- Explain Kerberos 5 authentication. Why there is not need to trust
much on each computer?
- What methods can be used for authentication? What are threats on
authentication?
- How autentication can be defeated.
- What kind of costs there incur from implementing company-wide
authentication.
- Compare following authentication methods (password, smart card,
fingerprint,...)
- Compare following authentication methods for recovery of
authenticator (password, smart card, fingerprint,...)
- How FAR and FRR relate to each other?
- Explain how an authentication method can be used as a denial of
service?
- Describe GSM security system.
- Describe UMTS security system.
- What kind of advances there are in UMTS compared to GSM
- How IPSec can be implemented?
- Describe relations between IPsec databases?
- What security threats there are in MobileIP? Why route optimisation
is so complex?
- What types of firewalls there exists?
- What threats firewall protects from and what not?
- Describe Intrusion Prevention System.
- Describe Intrusion Detection System.
- Why it is difficult to trace back attacker in IP networks? Why this
is much easier in POTS network?
- Why denial of service is much easier attack than other?
- What kind of attacks are possible against routing protocols?
- Why goverment is interested about information security?
- According to Finnish law, what is identification data and who has
right to process it and for what purposes.
- Are following cases allowed by Finnish legislation:
- Analyse Ficora 11/2004M (attached) regulation on email: what
problems it solves and what new problems it may generate?
- Build a threat tree for (case, maybe with additional
material). Based on analysis, propose security improvement(s).
- What kind of malicious code exists? How to protect from each type?
- What kind of assurance one gets from penetration testing?
- Analyse following threats using STRIDE classification.
- Why highest levels of system evaluation are rare in commercial
systems?
This page is maintained by Webmaster and
Markus Peuhkuri.
Last update on the page
2005-05-10 11:55
URL: http://www.netlab.tkk.fi/opetus/s38153/k2005/questions.shtml
[TKK
> Electrical and Communications Engineering
> Studies
]