5: Information Security
- Page ID
- 58523
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)
- 5.2: Introduction to Secure Systems
- Threat classification; the concept of security as a negative goal; the safety net approach to security system design. Principles to follow for the design of a security system, and a basic security model that follows these principles.
- 5.3: Authenticating Principals
- Broad categories of methods for authenticating (verifying the identity of) a principal making a request. Cryptographic hash functions and their use in protecting passwords, as one of the most common methods of authenticating principals.
- 5.4: Authenticating Messages
- Authenticating messages in terms of both data integrity and origin authenticity; the difference between message authenticity and confidentiality. Closed vs open designs for authentication; shared-secret vs public-key cryptography; distribution of authentication keys.
- 5.5: Message Confidentiality
- Using encryption to ensure message confidentiality; how to achieve both authentication and confidentiality.
- 5.6: Security Protocols
- Considerations for designing security protocols for the distribution of keys. Comparison of the (incorrect) Denning-Sacco key exchange protocol with the Diffie-Hellman key exchange protocol, with and without a public-key system.
- 5.7: Authorization-Controlled Sharing
- Methods of authorization-controlled sharing: the simple guard model (ticket, list, and agency systems, protection groups); the caretaker model; non-discretionary access and information flow control. An example of the simple guard model system used by UNIX.
- 5.8: Reasoning About Authentication (Advanced Topic)
- More in-depth reasoning about authentication: authentication logic in hard-wired vs Internet approaches; authentication in distributed systems and across administrative realms; authentication of public keys and certificates, including certificate chains.
- 5.9: Cryptography as a Building Block (Advanced Topic)
- Some principles behind the cryptography transformations used for one-time pads, pseudorandom number generators, message authentication codes, hash algorithms, and public-key ciphers.
- 5.10: Summary
- Summary of the reasons why real-world computer systems are vulnerable, despite the past 7 sections detailing how to follow the design principles of building secure systems.
- 5.11: Case Study - Transport Layer Security (TLS) for the Web
- The basics behind Transport Layer Security (TLS), a common security protocol used to establish a secure channel over the Internet: the TLS handshake protocol, evolution of TLS over time, authenticating services and users with TLS.
- 5.12: War Stories - Security System Breaches
- Case studies: 15 examples of how the principles for designing a secure system can be violated, each error resulting in one or more real-world cases of a security breach. Includes examples of both digital and analog systems.