Outline for January 25, 2006
Reading: text, §23.1–23.2
- Greetings and felicitations!
- Puzzle of the day
- Penetration Studies
- Why? Why not direct analysis?
- Effectiveness
- Interpretation
- Flaw Hypothesis Methodology
- System analysis
- Hypothesis generation
- Hypothesis testing
- Generalization
- System Analysis
- Learn everything you can about the system
- Learn everything you can about operational procedures
- Compare to other systems
- Hypothesis Generation
- Study the system, look for inconsistencies in interfaces
- Compare to other systems' flaws
- Compare to vulnerabilities models
- Hypothesis testing
- Look at system code, see if it would work
(live experiment may be unneeded)
- If live experiment needed, observe usual protocols
- Generalization
- See if other programs, interfaces, or subjects/objects
suffer from the same problem
- See if this suggests a more generic type of flaw
- Elimination
- Examples
- MTS terminal system
- Burroughs system
Version of January 24, 2006 at 7:00 PM
You can also obtain a PDF version of this.