Outline for January 10, 2003

Reading: Chapters 13, 23.1-23.2

Discussion Problem

Bureaucracies have their own version of the English language with which you must become familiar. To help you do so, here are some common phrases. See if you can translate them.

  1. Scintillate, scintillate, asteroid minikin.
  2. Members of an avian species of identical plumage congregate.
  3. Surveillance should precede saltation.
  4. Pulchritude possesses solely cutaneous profundity.
  5. It is fruitless to become lachrymose over precipitately departed lacteal fluid.
  6. Freedom from incrustations of grime is contiguous to rectitude.
  7. The writing implement is more potent than the rapier.
  8. It is fruitless to attempt to indoctrinate a superannuated canine with innovative maneuvers.
  9. Eschew the implement of correction and vitiate the scion.
  10. The temperature of the aqueous content of an unremittingly galled saucepan does not reach 212 degrees Farenheit.
  11. Upon vacating these premises all illuminations are to be extinguished.

Outline for the Day

  1. Principles of Secure Design
    1. Principle of Least Privilege
    2. Principle of Fail-Safe Defaults
    3. Principle of Economy of Mechanism
    4. Principle of Complete Mediation
    5. Principle of Open Design
    6. Principle of Separation of Privilege
    7. Principle of Least Common Mechanism
    8. Principle of Psychological Acceptability
  2. Penetration Studies
    1. Why? Why not direct analysis?
    2. Effectiveness
    3. Interpretation
  3. Flaw Hypothesis Methodology
    1. System analysis
    2. Hypothesis generation
    3. Hypothesis testing
    4. Generalization
  4. System Analysis
    1. Learn everything you can about the system
    2. Learn everything you can about operational procedures
    3. Compare to other systems
  5. Hypothesis Generation
    1. Study the system, look for inconsistencies in interfaces
    2. Compare to other systems' flaws
    3. Compare to vulnerabilities models
  6. Hypothesis testing
    1. Look at system code, see if it would work (live experiment may be unneeded)
    2. f live experiment needed, observe usual protocols
  7. Generalization
    1. See if other programs, interfaces, or subjects/objects suffer from the same problem
    2. ee if this suggests a more generic type of flaw
  8. Peeling the Onion
    1. You know very little (not even phone numbers or IP addresses)
    2. You know the phone number/IP address of system, but nothing else
    3. You have an unprivileged (guest) account on the system.
    4. You have an account with limited privileges.
  9. Example Penetration Studies
    1. Michigan Terminal System
    2. Burroughs System
    3. Attacking the Organization Directly

Here is a PDF version of this document.