Stevens Institute of Technology - Department of Computer Science

CS615 Checkpoint Security

Please help us make this class as productive as possible by filling in this short pre-lecture questionnaire.

Please enter your full name:

Please enter your Stevens username:

Briefly define the term "Threat Model":

What is the difference between a vulnerability, an exploit, and an attack vector?

What is the difference between authentication and authorization?

How do private-key or symmetric cryptography and public-key or asymmetric cryptography differ?

Give a practical example each of private-key and public-key cryptography. E.g., which tools that you use on a regular basis use these?

What is the differene between encrypting a string and hashing it?