Outline for September 24, 2024
Reading:
text
, §1
Assignments:
Homework 1, due October 8; Project selection, due Oct 10
Class overview
Basic components
Confidentiality
Integrity
Availability
Threats
Snooping
Modification
Masquerading; contrast with delegation
Repudiation of origin
Denial of receipt
Delay
Denial of service
Role of policy
Example of student copying files from another
Emphasize: policy defines security
Distinguish between policy and mechanism
Goals of security
Prevention
Detection
Recovery
Trust
First problem: security mechanisms correctly implement security policy
Second problem: policy does what you want; define secure, precise
Operational issues; change over time
Cost-benefit analysis
Risk analysis (comes into play in cost-benefit too)
Laws and customs
Human Factors
Organizational problems
People problems (include social engineering)
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email:
mabishop@ucdavis.edu
ECS 235A, Computer and Information Security
Version of September 25, 2025 at 6:25AM
You can also obtain a PDF version of this.