Reading: §23.3–4, §2 Assignment: Homework 1, due April 17, 2015
Greetings and felicitations!
Discussion problem of the day
NRL
Goal: Find out how vulnerabilities enter the system, when they enter the system, and where they are
Axis 1: inadvertent (RISOS classes) vs. intentional (malicious/nonmalicious)
Axis 2: time of introduction (development, maintenance, operation)
Axis 3: location (hardware, software: OS, support utilities, applications)
Aslam
Goal: Treat vulnerabilities as faults
Coding faults: introduced during software development
Synchronization errors
Validation errors
Emergent faults: introduced by incorrect initialization, use, or application
Configuration errors
Environment faults
Introduced decision procedure to classify vulnerabilities in exactly one category
Models of Attacks
Example attack: rsh and synflooding
Capabilities and requires/provides models
Attack trees
Access Control Matrix
Subjects, objects, and rights
Primitive commands: create subject/object, enter right, delete right, destroy subject/object
Commands and conditions: create-file, various flavors of grant-right to show conditions and nested commands
Copy flag
Attenuation of privileges
Discussion question. After the first Gulf War ended in 1991, some generals realized that the Iraqi networks had been remarkably resilient. As soon as the Allies destroyed one station, the network promptly routed around it. The generals discovered that the Iraqis were using Internet routing protocols, which were designed for resiliency. Several promptly suggested that those protocols should be classified. What are the problems with doing this?