Outline for January 23, 2006
Reading
: text, §13, 23
- Greetings and felicitations!
- Puzzle of the day
- Common Implementation Vulnerabilities
- Not resetting privileges
(Purdue Games incident)
- Principles of Secure Design
- Principle of Least Privilege
- Principle of Fail-Safe Defaults
- Principle of Economy of Mechanism
- Principle of Complete Mediation
- Principle of Open Design
- Principle of Separation of Privilege
- Principle of Least Common Mechanism
- Principle of Psychological Acceptability
- Penetration Studies
- Why? Why not direct analysis?
- Effectiveness
- Interpretation
- Flaw Hypothesis Methodology
- System analysis
- Hypothesis generation
- Hypothesis testing
- Generalization
- System Analysis
- Learn everything you can about the system
- Learn everything you can about operational procedures
- Compare to other systems
- Hypothesis Generation
- Study the system, look for inconsistencies in interfaces
- Compare to other systems' flaws
- Compare to vulnerabilities models
- Hypothesis testing
- Look at system code, see if it would work
(live experiment may be unneeded)
- If live experiment needed, observe usual protocols
- Generalization
- See if other programs, interfaces, or subjects/objects
suffer from the same problem
- See if this suggests a more generic type of flaw
Version of January 23, 2006 at 7:00 AM
You can also obtain a PDF version of this.