February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis
Lecture A
- Motivation
- The model, informally
- The formal model
- Other thoughts
Slide #A-1
Lecture A Motivation The model, informally The formal model Other - - PowerPoint PPT Presentation
Lecture A Motivation The model, informally The formal model Other thoughts February 6, 2009 ECS 235B Winter Quarter 2009 Slide #A-1 Matt Bishop, UC Davis Overview What is recordation? Why do it electronically? Models
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis
Slide #A-1
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-2
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-3
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-4
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-5
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-6
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-7
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-8
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-9
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-10
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-11
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-12
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-13
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-14
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-15
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-16
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-17
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-18
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-19
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-20
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-21
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-22
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-23
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-24
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-25
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-26
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-27
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-28
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-29
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-30
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-31
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-32
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-33
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-34
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-35
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #9-36
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-37
– Threat: I change the document in transit, before, or after it was sent – Digital signature assures document unchanged since signed and binds document to a public key – Public key infrastructure (PKI) binds public keys to principles (users)
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-38
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-39
– PKI assumes certificates, binding keys to users, are issued to the right people
– On paper, this can usually be detected – Electronically, no way, unless original document digitally signed (see above)
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-40
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-41
– Where can attackers come from?
– Lots of vulnerabilities in all software, OSes
– Bad procedures can weaken the best system – Who installs security patches, keeps up to date with new attacks, holes?
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-42
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-43
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-44
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-45
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-46
February 6, 2009 ECS 235B Winter Quarter 2009 Matt Bishop, UC Davis Slide #A-47