Outline for March 29, 2006
Reading: text, §1, 13
- Greetings and felicitations!
- Review class information handouts
- Sketch of class
- Begin with overview
- Limits of security: what we can do–and can't do
- Policy models done formally
- Policy model composition
- Information flow models
- Theory of malicious logic
- Policy and mechanism
- Trust and assumptions
- Assurance
- Requirements and threat analysis
- Specification
- Design
- Implementation
- Deployment, maintenance, operation, retirement
- Underlying assumptions
- Stuff you won't hear again
- Legal, custom constraints
- Organizational problems
- People problems
- Principles of secure design
- Basis: simplicity and restriction
- Principle of least privilege
- Principle of fail-safe defaults
- Principle of economy of mechanism
- Principle of complete mediation
- Principle of open design
- Principle of separation of privilege
- Principle of least common mechanism
- Principle of psychological acceptability
Version of March, 2006 at 8:00 AM
You can also obtain a PDF version of this.