1 / 26

Computer Security CS 426 Lecture 15

CS426. Fall 2007/Lecture 15. 2. Announcements. Mid-term exam on October 18cover all materials up to this lecture, except for the lecture on Crypto by Prof. Nita-RotaruLecture on Tuesday October 16 will review homework 2 and cover new materials Future quizs will be announced at least one day befo

clem
Download Presentation

Computer Security CS 426 Lecture 15

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. CS426 Fall 2007/Lecture 15 1 Computer Security CS 426 Lecture 15 Integrity Protection: Biba, Clark-Wilson, and Chinese Wall

    2. CS426 Fall 2007/Lecture 15 2 Announcements Mid-term exam on October 18 cover all materials up to this lecture, except for the lecture on Crypto by Prof. Nita-Rotaru Lecture on Tuesday October 16 will review homework 2 and cover new materials Future quizs will be announced at least one day before the class TA’s office hour Wednesday and Friday 2:30pm to 3:30pm LWSN 2161

    3. CS426 Fall 2007/Lecture 15 3 Review Terminologies: Trusted, Trustworthy, TCB, Trusted Path, Trusted Computing Eight design principles due to Saltzer & Schroeder Security features for “Trusted OS” Reference monitor in “trusted OS” three features Orange Book (TCSEC): 7 levels Common Criteria: Protection Profiles, EAL 1-7

    4. CS426 Fall 2007/Lecture 15 4 Plan for this lecture Biba Clark-Wilson Chinese Wall Readings: Security Engineering: Chapter 8 and Chapter 9 Optional Readings: David D. Clark and David R. Wilson. “A Comparison of Commercial and Military Computer Security Policies.” In IEEE SSP 1987. David FC. Brewer and Michael J. Nash. “The Chinese Wall Security Policy.” in IEEE SSP 1989.

    5. CS426 Fall 2007/Lecture 15 5 What is integrity? Integrity: Critical data not changed in “incorrect” ways Confidentiality vs. Integrity

More Related