Outline for October 2, 2014
Reading
:
text
, §1, 2
Basic components
Confidentiality
Integrity
Availability
Threats
Snooping
Modification
Masquerading; contrast with delegation
Repudiation of origin
Denial of receipt
Delay
Denial of service
Role of policy
Example of student copying files from another
Emphasize: policy defines security
Distinguish between policy and mechanism
Goals of security
Prevention
Detection
Recovery
Trust
First problem: security mechanisms correctly implement security policy
Second problem: policy does what you want; define secure, precise
Operational issues; change over time
Cost-benefit analysis
Risk analysis (comes into play in cost-benefit too)
Laws and customs
Human Factors
Organizational problems
People problems (include social engineering)
Access control matrix and entities
State is (
S
,
O
,
A
) where
S
subjects,
O
objects,
A
access control matrix
Entries are rights (represent abstract notions)
Primitive operations
enter
r
into
A
[
s
,
o
]
delete
r
from
A
[
s
,
o
]
create
subject
s
(note that ∀
x
[
A
[
s’
,
x
] =
A
[
x
,
s’
] = ∅])
create
object
o
(note that ∀
x
[
A
[
x
,
o’
] = ∅])
destroy
subject
s
destroy
object
o
Commands and examples
Regular command:
create•file
Mono-operational command:
make•owner
Conditional command:
grant•rights
Biconditional command:
grant•read•if•r•and•c
Doing “or” of 2 conditions:
grant•read•if•r•or•c
Miscellaneous points
Copy flag and right
Own as a distinguished right
Principle of attenuation of privilege
You can also obtain a PDF version of this.
Version of October 1, 2014 at 10:45PM
ECS 235A, Computer and Information Security
Fall Quarter 2014