Outline for January 30, 2006
Reading: text, §23.4, 2
- Greetings and felicitations!
- Puzzle of the day
- NRL
- Goal: Find out how vulnerabilities enter the
system, when they enter the system, and where they are
- Axis 1: inadvertent (RISOS classes) vs.
intentional (malicious/nonmalicious)
- Axis 2: time of introduction (development,
maintenance, operation)
- Axis 3: location (hardware, software: OS, support
utilities, applications)
- Aslam
- Goal: Treat vulnerabilities as faults
- Coding faults: introduced during software
development
- Synchronization errors
- Validation errors
- Emergent faults: introduced by incorrect
initialization, use, or application
- Configuration errors
- Environment faults
- Introduced decision procedure to classify
vulnerabilities in exactly one category
- Access Control Matrix
- Subjects, objects, and rights
- Primitive commands: create subject/object,
enter right, delete right, destroy subject/object
Version of January 31, 2006 at 9:45 PM
You can also obtain a PDF version of this.