1. Who You Are

* 1. What type of student are you (undergrad, Master's, Ph.D.) and what year?

* 2. Briefly describe your background / experience with networking.

* 3. Briefly describe your background / experience with security.

* 4. How familiar are you with the following terms? (Don't worry if many are unfamiliar.)

  Haven't heard of it Know the term, not the specifics Understand pretty well Could lead a discussion of it
SYN flooding
normalization
stateful analysis
Kerberos
SYN cookies
Client puzzles
Bloom filters
symmetric vs. public-key cryptography
capabilities
SQL injection
cross-site scripting
DNSSEC
X.509 certificates
onion routing
side-channel attacks
ack-splitting
Snort
tcpdump
traffic analysis
TCP 3-way handshake
click fraud
Sybil attacks
Diffie-Hellman exchange
Code Red
Bayesian filtering
TOCTTOU vulnerabilites
nonces
Mitnick's attack on Shimomura
IP fragmentation
RBAC
Internet background radiation
soft state
man-in-the-middle attack
AJAX
key revocation
sniffer detection
domain typo-squatting
Wireshark
directory traversal attack
HTTP cookies
IP spoofing
buffer overflow defenses
ARP poisoning
ICMP redirect
OS fingerprinting
DNS cache poisoning
polymorphic and metamorphic exploits
taint-checking
Javascript

* 5. For each of the following topics, please indicate your degree of interest in it:

  What's that? Please No Not Really Sure Yes, Please
Protocol flaws
Distributed denial-of-service
Worms
Botnets
Network intrusion detection
Firewalls
Scanning
IPSec / VPNs
Web client & server attacks
Secure routing
Cryptographic protocols
Secure DNS
Anonymity
Spam
Phishing
Covert channels
Honeypots
Trace anonymization
Network forensics
VOIP
Wireless vulnerabilities
Cellular attacks
Multicast/group security
Peer-to-peer security
Traffic analysis
PKI
Sensor network security
Usability issues
Spyware
Underground economy
Security of ecommerce
Vehicular networks

* 6. If there are any particular papers you are interested in having the course cover, list them:

* 7. For each of the following, indicate how often you have done so:

  0 1-2 3-5 6+
Read a technical paper (journal or conference proceedings) on a CS topic
Read a technical paper on a network security topic
Written a technical paper on a CS topic
Written a technical paper on a network security topic
Reviewed a CS paper as part of peer review
Report a problem

T