Skip to content

Latest commit

 

History

History
36 lines (36 loc) · 1.74 KB

File metadata and controls

36 lines (36 loc) · 1.74 KB

Security and Protection

  • Security: policy (what will be done) of authorizing accesses
    • prevents intentional misuses of the system
  • Protection: mechanisms (how something will be done) implemented to enforce the specialized policy
    • prevents accidental and intentional misuses
  • Confidentiality: secret data remains secret
  • Integrity: unauthorized users should not be able to modify data
  • Availability: nobody can make a system unusable
  • Encryption
    • Uses a key to transform the data
    • Difficult to reverse without the key
  • UNIX stores encrypted passwords in /etc/passwd
    • uses one way transformers
    • required only lower-case, 5 letter passwords
    • require more complex password
  • Private key encryption of data
    • Encrypt(key, plaintext) = Cipher text
  • Eavesdropping: listeners approach
    • tap into the ethernet and see everything
    • countermeasure: pressurize cables
  • Abuse of privilege:
    • if the superuser is evil, not much you can do
  • Imposter: breaks into the system by pretending to be someone else
    • recorded voice and facial image
    • countermeasure: behavioral monitoring to look for suspicious activities
  • Trojan horse: seemingly innocent program performs an unexpected function
    • spyware is a variation that download ads, create popup windows and steal user information
    • countermeasure: integrity checking
  • Salami attack: builds up an attack one-bit at a time
    • partial pennies to a bank account
    • countermeasure: code reviews
  • Logic Bombs: a programmer secretly insert a piece of code into production system
  • Denial of Service attacks: aim to reduce system availability
    • throttle the system
    • randomware: can encrypt important files until a random is paid
    • countedmeasure: versioned backup