ECS 235B, Lecture 11
February 1, 2019
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 1
ECS 235B, Lecture 11 February 1, 2019 February 1, 2019 ECS 235B, - - PowerPoint PPT Presentation
ECS 235B, Lecture 11 February 1, 2019 February 1, 2019 ECS 235B, Foundations of Computer and Information Security 1 Waterfall Life Cycle Model Requirements definition and analysis Functional and non-functional General (for
February 1, 2019
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 1
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 2
Requirements definition and analysis System and software design Implementa- tion and unit testing Integration and system testing Operation and maintenance
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 3
really completed
and scoping of the project
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 4
Term “Agile software development” used to describe several Agile methodologies
(DSDM), Pragmatic Programming
In all, evidence of trustworthiness for assurance adduced after development
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 5
a sprint)
stakeholders
design, implement it
workable solution within each sprint
if not complete
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 6
lane
when another item arrives
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 7
enhance it
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 8
advance, and adequacy is goal
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 9
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 10
mathematical evidence
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 11
authentication
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 12
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 13
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 14
set up and no new ones can be added
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 15
assurance
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 16
that mediates all accesses to objects by subjects
reference monitor concept.
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 17
reference monitor
within a system responsible for enforcing security policy
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 18
requirements testing
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 19
UNIX system
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 20
privilege
least privilege
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 21
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 22
program
requirements (actually, 34 of them!)
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 23
ambiguous
that identification authenticated by the system” is less ambiguous
time of day, or something else?
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 24
that identification authenticated by the system before the system performs any functions on behalf of that identity”
behalf of user)
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 25
policies to create a new policy
cheaper than requirements analysis
February 1, 2019 ECS 235B, Foundations of Computer and Information Security 26