Outline for January 4, 2016
Reading: text, §1
Assignments due: Presentation paper selection, Jan. 22; Project selection, Jan. 22
- Class overview
- Basic components
- Confidentiality
- Integrity
- Availability
- Threats
- Snooping
- Modification
- Masquerading; contrast with delegation
- Repudiation of origin
- Denial of receipt
- Delay
- Denial of service
- Role of policy
- Example of student copying files from another
- Emphasize: policy defines security
- Distinguish between policy and mechanism
- Goals of security
- Prevention
- Detection
- Recovery
- Trust
- First problem: security mechanisms correctly implement security policy
- Second problem: policy does what you want; define secure, precise
- Operational issues; change over time
- Cost-benefit analysis
- Risk analysis (comes into play in cost-benefit too)
- Laws and customs
- Human Factors
- Organizational problems
- People problems (include social engineering)