In: Computer Science
What are the 3 goals of computer security, define them
Design a Authentication mutual protocol not subject to reflection attack
What are 3 types of hashing. Draw a diagram of hash function
What is a memory layout. Draw an example
Describe Buffer Flow attack