Outline for November 22, 2005
Reading: "FBI Alerts Public to Recent E-Mail Scheme," Federal Bureau of Investigation, Department of Justice (Nov. 21, 2005).
-
Virus Defenses
-
Can constrain case enough to locate specific malicious logic, using:
- Type checking (data vs. instructions)
-
Limiting rights (sandboxing)
-
Limiting sharing
-
Preventing or detecting changes to files
-
Prevent code from acting beyond specification (proof carrying code)
-
Check statistical characteristics of programs (more authors than known, constructs in object files not corresponding to anything in the source)
-
Safety on the Web: WWW
-
Unfriendly applets
-
Unfriendly images and pixels
-
Site and content filtering software
-
PHP, CGI, and all that: server side problems
-
Redirection
-
Naming problems
-
Safety on the Web: Email
-
Attachments, worms, and viruses
-
Spam
-
Joe jobs
-
Relaying through third parties
-
Zombies
-
Anti-spam technologies
-
Authentication and authorization services
-
Reputation services
-
Challenge-response
-
Port blocking and rate limiting
-
Preventing relaying
-
Spam filtering
-
Image blocking
-
Phishing
Puzzle of the Day
When you examine a system for security problems, or design a system with strengthened security, creativity in anticipating problems is a major factor in the success of your work. Here are some creative answers to the riddle, "Why did the chicken cross the road?" A child might answer: "To get to the other side." But what would others answer?
Plato:
Aristotle:
Karl Marx:
Timothy Leary:
Captain James T. Kirk:
Machiavelli:
Jack Nicholson:
Oliver Stone:
Albert Einstein:
Ralph Waldo Emerson:
Ernest Hemingway:
Colonel Sanders:
Here is a PDF version of this document.