Lecture 1: Introduction, Threat Models

Security  Goals v.s. Adversaries

1. Policy --> Confidentiality, Integrity, Availability

2. Threat Modeling --> assumptions about adversaries

3. Mechanism --> software/ hardware/ system

Policy:

Recovery questions: Yahoo case

Gmail case: Every party do right things however hackers laughs

Suggestion: Be conservative about the policy.

Threat Modeling:

 

MIT 1980's Kerberos 56 bits DES

SSL/TLS CAs

DARPA secure OS

Mechanism:

Apple iCloud case


Citi Case

Android Bitcoin

Java Function: SecureRandom( ); SecureRandom( )  --> PRNG --> Random private key

PRNG is forgotten, then can guess SecureRandom( ) output.





Sparks:

1. Email is a little like Single Sign On (SSO) of a person's information system, since there are so many other accounts are bound to the email account, is the email account is compromised, other account will also be put in danger.

2. Apple's iCloud example, software will have vulnerabilities, for instance, the "Find my iPhone" subsystem forgot to check the brute force attack. Patches the vulnerability will works however if SOC exist, it will be find easier and be protected quickly.

3. Threat modeling: "Threat Modeling" Frank Swiderski

4. "Citi" case: Vulnerability always exits, quick response can largely decrease the damage.

最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
平台声明:文章内容(如有图片或视频亦包括在内)由作者上传并发布,文章内容仅代表作者本人观点,简书系信息发布平台,仅提供信息存储服务。

推荐阅读更多精彩内容