Notes for March 3, 1997 1. Hello 2. Puzzle of the day a. Harden the systems. b. Call his mother. 3. ISA threat model a. disclosure (snooping) b. modification c. masquerade d. delay e. denial of service f. replay g. denial of receipt h. repudiation 4. Kerberos a. Needham-Schroeder secret-key protocol b. Denning-Sacco augmentation c. Kerberos implementation