* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Learning Objectives by Lesson
Survey
Document related concepts
Transcript
EC310: Applications of Cyber Engineering Learning Objectives by Lesson Chapter 1: Number Systems Objectives: (a) Discuss the role of the operating system in bridging the gap between hardware and user applications and services. (b) Explain the relationship between secondary memory, main memory and the CPU. (c) Explain the meaning of the terms byte, word and half-word. (d) Convert between binary and decimal notation. (e) Convert between hexadecimal and decimal notation. (f) Convert between hexadecimal and binary notation. (g) Evaluate how characters are stored using ASCII notation. Chapter 2: C Programs Objectives: a) Explain the distinction between machine language, assembly language and programs written in a high-level language. b) Demonstrate the ability to analyze simple C programs that perform keyboard input, screen output and simple arithmetic. c) Demonstrate the ability to create, edit, compile and execute C programs in a Linux environment. d) Explain how integers and characters are stored and encoded in memory. Chapter 3: Assembly Language and Memory Objectives: (a) Explain the operations of several basic assembly language commands, including mov, cmp, jmp, jle, jne and inc. (b) Demonstrate the ability to debug a running C program in memory, to include the inspection of processor registers and arbitrary memory locations (c) Demonstrate the ability to analyze C programs that employ if-else statements and for loops. (d) Apply Boolean logic to evaluate how selection structures can alter program flow. (e) Analyze existing programs for flaws with the gdb debugger. Chapter 4: Arrays and Strings Objectives: (a) Describe how an array is stored in memory. (b) Define a string, and describe how strings are stored. (c) Describe the implications of reading or writing beyond the boundary of an array. (d) Describe how to change the values of individual array elements Chapter 5: Introduction to Pointers Objectives: (a) Explain the operation of the address operator. (b) Describe the relationships that exist between pointers, arrays and strings. (c) Differentiate between the value of a pointer and the address of a pointer. Chapter 6: Functions and the Stack Objectives: (a) Demonstrate the ability to analyze simple programs using functions. (b) Describe the organization and contents of a program’s stack throughout the program’s execution. (c) Demonstrate the ability to examine the stack values of a running program. Chapter 7: The Buffer Overflow Objectives: (a) Describe the buffer overflow attack, determine what features of C make it possible, and identify who is responsible for memory management in C. (b) Demonstrate the ability to craft simple buffer overflow exploits (c) Explain how specific buffer overflow attacks work by describing stack operations. (d) Analyze programs that submit input via the command line. 1 Chapter 8: The Heap Objectives: (a) Explain the purpose of the heap and describe how memory on the heap is allocated. Chapter 9: Privilege Management Objectives: (a) Describe how permissions are managed and controlled in a multi-user OS environment. (b) Explain how users can be afforded the limited ability to execute commands with escalated privileges. Chapter 10: A Real Buffer Overflow Objectives: (a) Describe how a buffer overflow attack can be used to gain root access to a computer. (b) Describe two techniques that a hacker can use to make it simpler to craft a buffer overflow. (c) Describe technical solutions that have been proposed to prevent a program from being exploited by a buffer overflow. Chapter 11: The TCP/IP Model Objectives: (a) Describe the TCP/IP model, the functions performed by each layer, and the process of encapsulation. (b) Define the function of a protocol. Chapter 12: Ethernet Objectives: (a) Define the structure of an Ethernet address. (b) State the minimum and maximum size of an Ethernet frame. (c) Calculate the bandwidth available to users in various network configurations. (d) Distinguish between the capabilities and uses of a hub, a bridge and a switch. Chapter 13: The Internet Protocol Objectives: (a) Summarize the principles behind the design of the Internet Protocol. (b) Define the structure of an IP address and define the purpose of the network masking. (c) Determine the address space available given an IP address and mask. (d) Identify and explain the basic fields of the IP header. (e) Understand the current use of the IP address space. Chapter 14: Routing Part I Objectives: (a) State the purpose of the Address Resolution Protocol and describe its role in facilitating communication. (b) Describe the mechanism for spoofing an ARP cache with misinformation. (c) Describe how routing works at the network layer. (d) Construct an optimal routing table for a router given a network diagram and using address aggregation. (e) Describe how to make a routing decision based on the longest mask matching principle given a network diagram and a destination IP address. Chapter 15: Routing Part II Objectives: (a) Describe the fundamental algorithms used to construct routing tables. (b) Describe how a routing table is developed using link state routing. (c) Describe how a routing table is developed using distance vector routing. (d) Identify the relative advantages and disadvantages of link state routing and distance vector routing. Chapter 16: The Man-In-The-Middle Attack Objectives: (a) Describe the Man-In-The-Middle (MITM) attack and list what advantages it provides the attacker. (b) Construct a routing table based on a network diagram and manipulate a routing table to exploit a specific target. (c) Describe the steps that should be taken to prevent false route injection and identify who is responsible for performing these preventative actions and how they can be applied. 2 Chapter 17: Border Gateway Protocol Objectives: (a) Discuss the major concerns with the use of a single protocol for the Internet. (b) Describe the various autonomous system categories. (c) Utilize path attributes to determine the path of a packet across ASs (d) Demonstrate the ability to state the BGP announcements that would be made given an internet diagram. Chapter 18: Border Gateway Protocol Routing Objectives: (a) Given a network diagram consisting of a limited number of connected Autonomous Systems (AS) and various BGP path announcements, determine the direction of traffic across all ASs in accordance with the BGP path selection algorithm. (b) Identify what is required to secure Internet routing, distinguish the negative and positive consequences of various proposed solutions, and recognize the state of security in Internet routing today. (c) Describe the steps that should be taken to prevent false route injection in or manipulation of the Internet routing system and identify who is responsible for performing these preventative actions and how they can be applied. (d) State the fundamental principle of communication as it relates to security. Chapter 19: Communications Systems, EM Spectrum & Signals Objectives: (a) Describe the four components of a communications system and the impact on security of using free space as a communication medium. (b) Identify communication applications for various bands of the electromagnetic spectrum ranging from extremely low frequency (ELF) to extremely high frequency (EHF). (c) Define the term signal and explain the basic properties of a sinusoidal electromagnetic signal (period, frequency, wavelength, phase, and amplitude) and describe their mathematical relationship. (d) Plot simple (sinusoidal) electromagnetic signals in the time and frequency domains; interpret time- and frequency-domain plots to determine the associated signals. (e) Define and calculate bandwidth of transmitted signals. Chapter 20: Introduction to Modulation Objectives: (a) Define the term baseband signal and describe some potential limitations associated with transmitting baseband signals directly. (b) Discuss the role of modulation in signal transmission and the methods of modulating a sinusoidal carrier. (c) Using a plot of an AM signal, determine Vmax, Vmin, Vm, Vc and m. (d) Create a frequency plot for and determine the sidebands and bandwidth of an AM signal where the information signal consists of one or more distinct sinusoids. (e) Determine the condition for overmodulation in an AM signal, and the consequence of overmodulation. Chapter 21: Analog to Digital Conversion Objectives: (a) Provide examples of analog and digital communications systems. (b) Describe the advantages of digital over analog communications. (c) Discuss the basic steps of the analog-to-digital conversion process: sampling and quantizing/encoding. (d) Given an analog waveform, sampling rate, and resolution, determine the resulting quantized signal and the binary encoded A/D output. (e) Calculate the Nyquist sampling rate for an analog signal. (f) Given the number of bits in an A/D process, and sample frequency, determine the generated bit rate. (g) Describe how the number of bits used in the A/D process affects the reconstructed analog signal. Chapter 22: Digital Modulation Objectives: (a) Quantitatively describe the relationship between a symbol and a bit and the bit rate and the baud. (b) Describe how digital information is conveyed using various digital modulation techniques (ASK or OOK, FSK, PSK and QAM) and recognize their waveforms, and constellations. (c) Calculate the bandwidth of an ASK, FSK, PSK, or QAM signal. (d) Using a constellation diagram analyze a M-ary PSK signal to determine its symbols and bits per symbols. (e) Discuss the effect of noise on M-ary PSK and how Quadrature Amplitude Modulation (QAM) overcomes these detrimental effects. 3 Chapter 23: Power Gain and SNR Objectives: (a) Define gain and attenuation and describe their application to communications. (b) Calculate power gains for single and multiple stage systems; determine power at each stage. (c) Express power gain in dB, and power levels in dBW and dBm. Compute power gain and power from dB, dBW and dBm. (d) Calculate signal to noise ratio (SNR) and discuss the impact of noise in a communication system. Chapter 24: Antennas Objectives: (a) Describe the role of an antenna in a wireless communication system. (b) Explain the difference between power gain and antenna gain, and compute an antenna's gain relative to an isotropic point source (dBi). (c) Describe the advantages and disadvantages of directional antennas. (d) Describe the role of directors and reflectors in the design of a Yagi Antenna. (e) Interpret an antenna's radiation pattern to determine the sidelobe level and front-to-back ratio in dB, the beamwidth, and directions from which interfering or eavesdropping antennas may lay. Chapter 25: Propagation Objectives: (a) Define reflection, refraction, diffraction and scattering. (b) Describe the characteristics of ground waves, sky waves, and space waves. (c) Calculate the radio horizon distance for space waves based on antenna height. (d) Compute received power level for a communication system using Friis Free Space equation. (e) Using the log-normal propagation model, compute received power, path loss or transmission distance. Chapter 26: Electronic Warfare Objectives: (a) Define Electronic Warfare and provide an example of each of the three Electronic Warfare categories: Electronic Defense, Electronic Warfare Support and Electronic Attack. (b) Define Jamming to Signal ratio (J/S) and calculate the necessary power to jam an emitter. 4