Download Learning Objectives by Lesson

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Airborne Networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Buffer overflow wikipedia , lookup

Buffer overflow protection wikipedia , lookup

Routing wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
EC310: Applications of Cyber Engineering
Learning Objectives by Lesson
Chapter 1: Number Systems
Objectives:
(a) Discuss the role of the operating system in bridging the gap between hardware and user applications and services.
(b) Explain the relationship between secondary memory, main memory and the CPU.
(c) Explain the meaning of the terms byte, word and half-word.
(d) Convert between binary and decimal notation.
(e) Convert between hexadecimal and decimal notation.
(f) Convert between hexadecimal and binary notation.
(g) Evaluate how characters are stored using ASCII notation.
Chapter 2: C Programs
Objectives:
a) Explain the distinction between machine language, assembly language and programs written in a high-level language.
b) Demonstrate the ability to analyze simple C programs that perform keyboard input, screen output and simple arithmetic.
c) Demonstrate the ability to create, edit, compile and execute C programs in a Linux environment.
d) Explain how integers and characters are stored and encoded in memory.
Chapter 3: Assembly Language and Memory
Objectives:
(a) Explain the operations of several basic assembly language commands, including mov, cmp, jmp, jle, jne and inc.
(b) Demonstrate the ability to debug a running C program in memory, to include the inspection of processor registers and
arbitrary memory locations
(c) Demonstrate the ability to analyze C programs that employ if-else statements and for loops.
(d) Apply Boolean logic to evaluate how selection structures can alter program flow.
(e) Analyze existing programs for flaws with the gdb debugger.
Chapter 4: Arrays and Strings
Objectives:
(a) Describe how an array is stored in memory.
(b) Define a string, and describe how strings are stored.
(c) Describe the implications of reading or writing beyond the boundary of an array.
(d) Describe how to change the values of individual array elements
Chapter 5: Introduction to Pointers
Objectives:
(a) Explain the operation of the address operator.
(b) Describe the relationships that exist between pointers, arrays and strings.
(c) Differentiate between the value of a pointer and the address of a pointer.
Chapter 6: Functions and the Stack
Objectives:
(a) Demonstrate the ability to analyze simple programs using functions.
(b) Describe the organization and contents of a program’s stack throughout the program’s execution.
(c) Demonstrate the ability to examine the stack values of a running program.
Chapter 7: The Buffer Overflow
Objectives:
(a) Describe the buffer overflow attack, determine what features of C make it possible, and identify who is responsible for
memory management in C.
(b) Demonstrate the ability to craft simple buffer overflow exploits
(c) Explain how specific buffer overflow attacks work by describing stack operations.
(d) Analyze programs that submit input via the command line.
1
Chapter 8: The Heap
Objectives:
(a) Explain the purpose of the heap and describe how memory on the heap is allocated.
Chapter 9: Privilege Management
Objectives:
(a) Describe how permissions are managed and controlled in a multi-user OS environment.
(b) Explain how users can be afforded the limited ability to execute commands with escalated privileges.
Chapter 10: A Real Buffer Overflow
Objectives:
(a) Describe how a buffer overflow attack can be used to gain root access to a computer.
(b) Describe two techniques that a hacker can use to make it simpler to craft a buffer overflow.
(c) Describe technical solutions that have been proposed to prevent a program from being exploited by a buffer overflow.
Chapter 11: The TCP/IP Model
Objectives:
(a) Describe the TCP/IP model, the functions performed by each layer, and the process of encapsulation.
(b) Define the function of a protocol.
Chapter 12: Ethernet
Objectives:
(a) Define the structure of an Ethernet address.
(b) State the minimum and maximum size of an Ethernet frame.
(c) Calculate the bandwidth available to users in various network configurations.
(d) Distinguish between the capabilities and uses of a hub, a bridge and a switch.
Chapter 13: The Internet Protocol
Objectives:
(a) Summarize the principles behind the design of the Internet Protocol.
(b) Define the structure of an IP address and define the purpose of the network masking.
(c) Determine the address space available given an IP address and mask.
(d) Identify and explain the basic fields of the IP header.
(e) Understand the current use of the IP address space.
Chapter 14: Routing Part I
Objectives:
(a) State the purpose of the Address Resolution Protocol and describe its role in facilitating communication.
(b) Describe the mechanism for spoofing an ARP cache with misinformation.
(c) Describe how routing works at the network layer.
(d) Construct an optimal routing table for a router given a network diagram and using address aggregation.
(e) Describe how to make a routing decision based on the longest mask matching principle given a network diagram and a
destination IP address.
Chapter 15: Routing Part II
Objectives:
(a) Describe the fundamental algorithms used to construct routing tables.
(b) Describe how a routing table is developed using link state routing.
(c) Describe how a routing table is developed using distance vector routing.
(d) Identify the relative advantages and disadvantages of link state routing and distance vector routing.
Chapter 16: The Man-In-The-Middle Attack
Objectives:
(a) Describe the Man-In-The-Middle (MITM) attack and list what advantages it provides the attacker.
(b) Construct a routing table based on a network diagram and manipulate a routing table to exploit a specific target.
(c) Describe the steps that should be taken to prevent false route injection and identify who is responsible for performing these
preventative actions and how they can be applied.
2
Chapter 17: Border Gateway Protocol
Objectives:
(a) Discuss the major concerns with the use of a single protocol for the Internet.
(b) Describe the various autonomous system categories.
(c) Utilize path attributes to determine the path of a packet across ASs
(d) Demonstrate the ability to state the BGP announcements that would be made given an internet diagram.
Chapter 18: Border Gateway Protocol Routing
Objectives:
(a) Given a network diagram consisting of a limited number of connected Autonomous Systems (AS) and various BGP path
announcements, determine the direction of traffic across all ASs in accordance with the BGP path selection algorithm.
(b) Identify what is required to secure Internet routing, distinguish the negative and positive consequences of various proposed
solutions, and recognize the state of security in Internet routing today.
(c) Describe the steps that should be taken to prevent false route injection in or manipulation of the Internet routing system and
identify who is responsible for performing these preventative actions and how they can be applied.
(d) State the fundamental principle of communication as it relates to security.
Chapter 19: Communications Systems, EM Spectrum & Signals
Objectives:
(a) Describe the four components of a communications system and the impact on security of using free space as a
communication medium.
(b) Identify communication applications for various bands of the electromagnetic spectrum ranging from extremely low
frequency (ELF) to extremely high frequency (EHF).
(c) Define the term signal and explain the basic properties of a sinusoidal electromagnetic signal (period, frequency, wavelength,
phase, and amplitude) and describe their mathematical relationship.
(d) Plot simple (sinusoidal) electromagnetic signals in the time and frequency domains; interpret time- and frequency-domain
plots to determine the associated signals.
(e) Define and calculate bandwidth of transmitted signals.
Chapter 20: Introduction to Modulation
Objectives:
(a) Define the term baseband signal and describe some potential limitations associated with transmitting baseband signals
directly.
(b) Discuss the role of modulation in signal transmission and the methods of modulating a sinusoidal carrier.
(c) Using a plot of an AM signal, determine Vmax, Vmin, Vm, Vc and m.
(d) Create a frequency plot for and determine the sidebands and bandwidth of an AM signal where the information signal
consists of one or more distinct sinusoids.
(e) Determine the condition for overmodulation in an AM signal, and the consequence of overmodulation.
Chapter 21: Analog to Digital Conversion
Objectives:
(a) Provide examples of analog and digital communications systems.
(b) Describe the advantages of digital over analog communications.
(c) Discuss the basic steps of the analog-to-digital conversion process: sampling and quantizing/encoding.
(d) Given an analog waveform, sampling rate, and resolution, determine the resulting quantized signal and the binary encoded
A/D output.
(e) Calculate the Nyquist sampling rate for an analog signal.
(f) Given the number of bits in an A/D process, and sample frequency, determine the generated bit rate.
(g) Describe how the number of bits used in the A/D process affects the reconstructed analog signal.
Chapter 22: Digital Modulation
Objectives:
(a) Quantitatively describe the relationship between a symbol and a bit and the bit rate and the baud.
(b) Describe how digital information is conveyed using various digital modulation techniques (ASK or OOK, FSK, PSK and
QAM) and recognize their waveforms, and constellations.
(c) Calculate the bandwidth of an ASK, FSK, PSK, or QAM signal.
(d) Using a constellation diagram analyze a M-ary PSK signal to determine its symbols and bits per symbols.
(e) Discuss the effect of noise on M-ary PSK and how Quadrature Amplitude Modulation (QAM) overcomes these detrimental
effects.
3
Chapter 23: Power Gain and SNR
Objectives:
(a) Define gain and attenuation and describe their application to communications.
(b) Calculate power gains for single and multiple stage systems; determine power at each stage.
(c) Express power gain in dB, and power levels in dBW and dBm. Compute power gain and power from dB, dBW and dBm.
(d) Calculate signal to noise ratio (SNR) and discuss the impact of noise in a communication system.
Chapter 24: Antennas
Objectives:
(a) Describe the role of an antenna in a wireless communication system.
(b) Explain the difference between power gain and antenna gain, and compute an antenna's gain relative to an isotropic point
source (dBi).
(c) Describe the advantages and disadvantages of directional antennas.
(d) Describe the role of directors and reflectors in the design of a Yagi Antenna.
(e) Interpret an antenna's radiation pattern to determine the sidelobe level and front-to-back ratio in dB, the beamwidth, and
directions from which interfering or eavesdropping antennas may lay.
Chapter 25: Propagation
Objectives:
(a) Define reflection, refraction, diffraction and scattering.
(b) Describe the characteristics of ground waves, sky waves, and space waves.
(c) Calculate the radio horizon distance for space waves based on antenna height.
(d) Compute received power level for a communication system using Friis Free Space equation.
(e) Using the log-normal propagation model, compute received power, path loss or transmission distance.
Chapter 26: Electronic Warfare
Objectives:
(a) Define Electronic Warfare and provide an example of each of the three Electronic Warfare categories: Electronic Defense,
Electronic Warfare Support and Electronic Attack.
(b) Define Jamming to Signal ratio (J/S) and calculate the necessary power to jam an emitter.
4