home | articles | links | fun | about
Up to: CS432 Information Security

Intro to Information Security (9/12/02)

Rules of thumb

Security properties: CIA

Policy vs enforcement (mechanism)

Policy: The rules

Enforcement: ensures rules are followed

Threat model: first step in security design

Who is adversary? Motivation, goals, resources, capabilities

Design to withstand attacks from some adversary (Better adversary may still break into system)

Straw-man design

Security basics

Lessons from Princeton/Yale hack

More than 1 solution to security problems, some not so obvious

Not always deep technical issues

Good solution requires more work (emailing out passwords, etc.)

Common mistakes