Outline for September 29, 2005
Reading: "The Law" by Robert Coates
-
All about the class
-
Puzzle of the day
-
Overview of goals of computer security
-
Confidentiality
-
Integrity
-
Availability
-
Policies and mechanisms
-
Goals of security
-
Prevention
-
Detection
-
Recovery
-
Trust and assumptions
-
Functionality and assurance
-
Laws and customs
-
Human issues
-
Organizational problems
-
People problems
Puzzle of the Day
A hypothetical computer science department provides a Hypothetical Computer Science Instructional Facility. Students do their homework on the HCSIF computers. Suppose Alice, a student in a beginning programming class, writes a program but fails to use the protection mechanisms to prevent others from reading it. Bob, another student in the same class, reads Alice's program.
-
If the security policy of the HCSIF says that students are not allowed to read homework-related files from other students, has Bob violated security? Has Alice?
-
If Alice had used the protection mechanisms to prevent other students from reading the file, but Bob figured out a way to read the file, would your answer to part 1 change? If so, how?
-
If Alice told Bob to "feel free to look at my answer, just don't copy it," would your answer to part 1 change? If so, how?
Here is a PDF version of this document.