120 likes | 283 Views
Revision Lecture. Guilin Wang The School of Computer Science 7 May 2008 ( L22 ). Outline. Continuous Assessment - Evaluation Procedure - Common Shortcomings - Result Exam Tips - Types of Questions. 1. Continuous Assessment. ■ Evaluation Procedure
E N D
Revision Lecture Guilin Wang The School of Computer Science 7 May 2008 (L22)
Outline • Continuous Assessment - Evaluation Procedure - Common Shortcomings - Result • Exam Tips - Types of Questions
1. Continuous Assessment ■Evaluation Procedure - Evaluate each report individually - Compare the reports belonging to the same topic - Re-scale the marks in considering all reports ■ Some Common Shortcomings - References are not given in a clear way - Structure is not well-organized - Survey is not comprehensive - Simply listing some (dis)advantages is not enough
1. Continuous Assessment ■ Result - 45-59%: 6 - 60-69%: 3 - 70-79%: 8 - 80-89%: 17 - 90%: 1 ■ Feedback - How many working days have you spent on your report?
2. Exam Tips ■ Five Questions: - Each question accounts for 25%. - Select any 4 questions to answer. - Question 5 consists of four small questions so that you can choose any two to answer. - Most of questions are moderately difficult. ■ Final Mark: 100%= 80% of Exam+20% of Continuous Assessment.
2. Exam Tips ■ Types of Questions - Knowledge Questions: 40% - Understanding Questions: 60% ■ Knowledge Questions - Understand common network threats, vulnerabilities, and attacks. - Be able to explain basic security concepts, and mechanisms. - Be able to compare (dis)advantages among similar security countermeasures or standards. - …
2. Exam Tips Examples of knowledge questions: 1) Compare different types of firewalls. - Packet-Filtering Router - Application-Level Gateways - Circuit-Level Gateways Explain what they are, and compare their advantages and disadvantages.
2. Exam Tips 2) List the advantages of implementing security on IP level? - Most general but least flexible. - Transparent to applications, so no need to change applications if IPSec is realized on firewall or router, and no need to train and manage users (issuing/revoking keys). - Flexible policy framework, but complicated administration. - Provides routing security. - Can prevent traffic analysis.
2. Exam Tips ■ Understanding Questions - Analyze the security threats and requirements for a given scenario - Select proper security tools to provide a security solution. - Evaluate the security of a given security protocol or application - Understand the importance of security assumptions in security applications - …
2. Exam Tips ■ An Example of Understanding Questions 1) Design an off-line e-cash protocol and discuss its security. - Explain what is an off-line e-cash protocol - Review the main security requirement for such a protocol, like anonymity and preventing double spending etc. - Show a protocol (by using blind signatures) - Evaluate the security of your protocol
2. Exam Tips ■ Examinable Contents: - All lectures, except two guest lectures by Liqun, and Steve and Simon. - Read textbook, handout, and slides. SYLLABUS PAGE http://www.cs.bham.ac.uk/internal/modules/2007/20009.html
Summary This Lecture: ■ Continuous Assessment ■ Exam Tips Good Luck!