Notes for October 1, 1999

  1. Greetings and Felicitations!
    1. Go through handouts, class rules
  2. Puzzle of the day
  3. How do you design a security policy?
    1. Risk analysis
    2. Analysis of other factors
    3. Procedures
  4. Risk analysis
    1. What are the threats?
    2. How likely are they to arise?
    3. How can they best be dealt with?
  5. Analysis of other factors
    1. What else affects the policy (federal or state law, needs, etc.)?
    2. Law: as above; discuss jurisdiction (federal or local), problems (authorities' lack of knowledge about computers, etc.); chain of evidence
    3. Discuss cryptographic software controls (here, France, etc.)

Send email to

Department of Computer Science
University of California at Davis
Davis, CA 95616-8562

Page last modified on 9/30/99