Outline for January 24, 2002
Reading: §19.2, §2.1-2.2, §4.1-4.5
-
Greetings and Felicitations!
-
Puzzle of the day
-
Peeling the Onion
-
You know very little (not even phone numbers or IP addresses)
-
You know the phone number/IP address of system, but nothing else
-
You have an unprivileged (guest) account on the system.
-
You have an account with limited privileges.
-
Example Penetration Studies
-
Michigan Terminal System
-
Burroughs System
-
Attacking the Organization Directly
-
Access Control Matrix
-
Subjects, objects, and rights
-
HRU Result
-
Notion of leakage in terms of ACM
-
Determining security of a generic system with generic rights is undecidable
-
Meaning: can't derive a generic algorithm; must look at (sets of) individual cases
-
Policy
-
Sets of authorized, unauthorized states
-
Secure systems in terms of states
-
Mechanism vs. policy
-
Types of Policies
-
Military/government vs. confidentiality
-
Commercial vs. integrity
-
Types of Access Control
-
Mandatory access control
-
Discretionary access control
-
Originator-controlled access control
-
High-Level Policy Languages
-
Characterization
-
Example: DTEL
-
Low-Level Policy Languages
-
Characterization
-
Example: Tripwire configuration file