Outline for February 3, 2003
Reading: text, §5.2.1-5.2.2, 5.3, 6.1-6.2
If we do not wish to fight, we can prevent the enemy from engaging us even though the lines of encampment be merely traced out on the ground. All we need to do is to throw something odd and unaccountable in his way.
Tu Mu relates a strategm of Chu-ko Liang, who in 149 B.C., when occupying Yang-p'ing and about to be attacked by Ssu-ma I, suddenly struck his colors, stopping the beating of the drums, and flung open the city gates, showing only a few men engaged in sweeping and sprinkling the ground. This unexpected proceeding had the intended effect; for Ssu-Ma I, suspecting an ambush, actually drew off his army and retreated.1
What does this paragraph say to a system administrator or security officer seeking insight to defend her systems?
Outline for the Day
- Bell-LaPadula Model
- BLP as lattice structure
- Simple Security Property
- Basic Security Theorem
- DG/UX B2 UNIX System
- Hierarchy of levels
- Labels, explicit and implicit
- MAC tuples
- Strong tranquility
- Weak tranquility
- Integrity models
- Users won't write their own programs, but will use existing programs, databases, etc.
- Programmers develop and test programs on non-production systems
- Installing a program from the development system requires a special process
- This process must be controlled and auditable
- System managers must be able to access the system state and the system logs
- Separation of duty
- Separation of function
- Biba: mathematical dual of BLP
- P may read O if L(P) ≤ L(O) and C(P) ⊆ C(O)
- P may write O if L(O) ≤ L(P) and C(O) ⊆ C(P)
- Combined with BLP: continue example
Here is a PDF version of this document.