v      Subject matter

v     Coverage

Ø      Through Tuesday, April 25, 2006

Ø      Chapters 14 through 19

v     Preparation

Ø      Read chapters 14 through 19

Ø      Suggested problems

§         14.3, 14.4

§         15.4, 15.6

§         16.2, 16.3

§         17.2, 17.3

§         18.6, 18.8

§         19.2

v     Exam methodology

Ø      See exam policies

Ø      Open book and notes (avoids memorization)

Ø      Mostly short-answer

§         What if

§         Why

§         Invent a way to do---

§         Protocol analysis and diagnosis

·        Expect a protocol analysis question of at least one exchange in book – for example one of the Oakley variants or an ISAKMP

·        SSL emphasis – some on SET techniques

·        How do attacks such as SYN flooding and related TCP attacks work

Ø      Learn capabilities, not forgettable details

Ø      Emphasis is more on protocols and algorithm consequences than on ciphers themselves