Outline for January 24, 2002

Reading: §19.2, §2.1-2.2, §4.1-4.5

  1. Greetings and Felicitations!
  2. Puzzle of the day
  3. Peeling the Onion
    1. You know very little (not even phone numbers or IP addresses)
    2. You know the phone number/IP address of system, but nothing else
    3. You have an unprivileged (guest) account on the system.
    4. You have an account with limited privileges.
  4. Example Penetration Studies
    1. Michigan Terminal System
    2. Burroughs System
    3. Attacking the Organization Directly
  5. Access Control Matrix
    1. Subjects, objects, and rights
  6. HRU Result
    1. Notion of leakage in terms of ACM
    2. Determining security of a generic system with generic rights is undecidable
    3. Meaning: can't derive a generic algorithm; must look at (sets of) individual cases
  7. Policy
    1. Sets of authorized, unauthorized states
    2. Secure systems in terms of states
    3. Mechanism vs. policy
  8. Types of Policies
    1. Military/government vs. confidentiality
    2. Commercial vs. integrity
  9. Types of Access Control
    1. Mandatory access control
    2. Discretionary access control
    3. Originator-controlled access control
  10. High-Level Policy Languages
    1. Characterization
    2. Example: DTEL
  11. Low-Level Policy Languages
    1. Characterization
    2. Example: Tripwire configuration file

ECS 153, Introduction to Computer Security
Winter Quarter 2002
Email: [email protected]