Notes for March 3, 1997

  1. Hello
  2. Puzzle of the day
    1. Harden the systems.
    2. Call his mother.
  3. ISA threat model
    1. disclosure (snooping)
    2. modification
    3. masquerade
    4. delay
    5. denial of service
    6. replay
    7. denial of receipt
    8. repudiation
  4. Kerberos
    1. Needham-Schroeder secret-key protocol
    2. Denning-Sacco augmentation
    3. Kerberos implementation

You can also see this document as a Binhex Framemaker version 5 document, Postscript document, or a plain ASCII text document.


Send email to cs153@csif.cs.ucdavis.edu.

Department of Computer Science
University of California at Davis
Davis, CA 95616-8562



Page last modified on 3/9/97