Outline for November 19, 2003

Reading: Chapter 18

Discussion Problem

You discover a security flaw in the operating system on your company's computer. The flaw enables any user to read any other user's files, regardless of their protection. You have several choices: you can keep quiet and hope no-one else discovers the flaw, or tell the company, or tell the system vendor, or announce it on the Internet.

  1. Suppose an exploitation of t he vulnerability could be prevented by proper system configuration. Which of the above courses of action would you take, and why?
  2. If an exploitation of the vulnerability could be detected (but not prevented) by system administrators, how would this change your answer to question 1?
  3. Now suppose no exploitation of the vulnerability can be detected or prevented. Would this change your answer, and if so, how?

Outline for the Day

  1. Assurance
    1. Trustworthy entities
    2. Security assurance
    3. Trusted system
    4. Why assurance is needed
    5. Requirements
    6. Assurance and software life cycle
  2. Building trusted systems
    1. Stage 1: conception
    2. Stage 2: manufacture
    3. Deployment
    4. Maintenance


Here is a PDF version of this document.