Lecture 19 Outline

Reading: text, 13, 18
Due: Homework 5, on June 2


  1. Greetings and felicitations!
    1. Discussion question
  2. Identity
    1. State and cookies
    2. Anonymity
  3. Assurance
    1. Trustworthy entities
    2. Security assurance
    3. Trusted system
    4. Why assurance is needed
    5. Requirements
    6. Assurance and the software life cycle


Discussion Problem. Saul Alinsky illustrated one of his rules of tactics for an organizer with the following example:

The third rule is: Whenever possible go outside of the experience of the enemy. Here you want to cause confusion, fear, and retreat.

General William T. Sherman, whose name still causes a frenzied reaction throughout the South, provided a classic example of going outside the enemy’s experience. Until Sherman, military tactics and strategies were based on standard patterns. All armies had fronts, rears, flanks, lines of communication, and lines of supply. Military campaigns were aimed at such standard objectives as rolling up the flanks of the enemy army or cutting the lines of supply or lines of communication, or moving around to attack from the rear. When Sherman cut loose on his famous March to the Sea, he had no front or rear lines of supplies or any other lines. He was on the loose and living on the land. The South, confronted with this new form of military invasion, reacted with confusion, panic, terror, and collapse. Sherman swept on to inevitable victory. It was the same tactic that, years later in the early days of World War II, the Nazi Panzer tank divisions emulated in their far-flung sweeps into enemy territory, as did our own General Patton with the American Third Armored Division.

— Saul Alinsky, Rules for Radicals, Random House, Inc., New York, NY (1972) pp. 127–128.

What does this have to do with computer security?


UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 153, Computer Security
Version of May 30, 2016 at 11:59PM

You can also obtain a PDF version of this.