neue Vorlesung; Inhaltsverzeichnis
This commit is contained in:
parent
f4e6d96450
commit
1173feae06
152
Systemsicherheit.md
Normal file
152
Systemsicherheit.md
Normal file
@ -0,0 +1,152 @@
|
||||
- [Introduction](#introduction)
|
||||
- [Risk Scenarios](#risk-scenarios)
|
||||
- [Security Goals](#security-goals)
|
||||
- [Security Engineering](#security-engineering)
|
||||
- [Lecture Roadmap](#lecture-roadmap)
|
||||
- [Security Requirements](#security-requirements)
|
||||
- [Vulnerabilities](#vulnerabilities)
|
||||
- [Human](#human)
|
||||
- [Organizational](#organizational)
|
||||
- [Technical](#technical)
|
||||
- [Summary](#summary)
|
||||
- [Threats](#threats)
|
||||
- [Attackers](#attackers)
|
||||
- [Attack Methods](#attack-methods)
|
||||
- [Damager Potential](#damager-potential)
|
||||
- [Summary](#summary-1)
|
||||
- [Risk Analysis](#risk-analysis)
|
||||
- [Summary](#summary-2)
|
||||
- [Security Policies and Models](#security-policies-and-models)
|
||||
- [Security Policies](#security-policies)
|
||||
- [Security Models](#security-models)
|
||||
- [Access Control Models](#access-control-models)
|
||||
- [IBAC](#ibac)
|
||||
- [RBAC](#rbac)
|
||||
- [ABAC](#abac)
|
||||
- [Summary](#summary-3)
|
||||
- [Information Flow Models](#information-flow-models)
|
||||
- [Denning](#denning)
|
||||
- [MLS](#mls)
|
||||
- [BLP](#blp)
|
||||
- [Biba](#biba)
|
||||
- [Summary](#summary-4)
|
||||
- [Non-interference Models](#non-interference-models)
|
||||
- [Hybrid Models](#hybrid-models)
|
||||
- [Brewer-Nash](#brewer-nash)
|
||||
- [LR-CW](#lr-cw)
|
||||
- [MLS-CW](#mls-cw)
|
||||
- [Practical Security Engineering](#practical-security-engineering)
|
||||
- [Model Engineering](#model-engineering)
|
||||
- [Model Specification](#model-specification)
|
||||
- [CorPS](#corps)
|
||||
- [SELinux Policy Language](#selinux-policy-language)
|
||||
- [Summary](#summary-5)
|
||||
- [Security Mechanisms](#security-mechanisms)
|
||||
- [Authorization](#authorization)
|
||||
- [Access Control Lists](#access-control-lists)
|
||||
- [Capability Lists](#capability-lists)
|
||||
- [Interceptors](#interceptors)
|
||||
- [Summary](#summary-6)
|
||||
- [Cryptographic Mechanisms](#cryptographic-mechanisms)
|
||||
- [Encryption](#encryption)
|
||||
- [Symmetric](#symmetric)
|
||||
- [Asymmetric](#asymmetric)
|
||||
- [Cryptographic Hashing](#cryptographic-hashing)
|
||||
- [Digital Signatures](#digital-signatures)
|
||||
- [Cryptographic Attacks](#cryptographic-attacks)
|
||||
- [Identification and Authentication](#identification-and-authentication)
|
||||
- [Passwords](#passwords)
|
||||
- [Biometrics](#biometrics)
|
||||
- [Cryptographic Protocols](#cryptographic-protocols)
|
||||
- [SmartCards](#smartcards)
|
||||
- [Authentication Protocols](#authentication-protocols)
|
||||
- [Summary](#summary-7)
|
||||
- [Security Architectures](#security-architectures)
|
||||
- [Design Principles](#design-principles)
|
||||
- [Operating Systems Architectures](#operating-systems-architectures)
|
||||
- [Nizza](#nizza)
|
||||
- [SELinux](#selinux)
|
||||
- [Distributed Systems Architectures](#distributed-systems-architectures)
|
||||
- [CORBA](#corba)
|
||||
- [Web Services](#web-services)
|
||||
- [Kerberos](#kerberos)
|
||||
- [Summary](#summary-8)
|
||||
|
||||
# Introduction
|
||||
## Risk Scenarios
|
||||
## Security Goals
|
||||
## Security Engineering
|
||||
## Lecture Roadmap
|
||||
|
||||
# Security Requirements
|
||||
## Vulnerabilities
|
||||
### Human
|
||||
### Organizational
|
||||
### Technical
|
||||
### Summary
|
||||
## Threats
|
||||
### Attackers
|
||||
### Attack Methods
|
||||
### Damager Potential
|
||||
### Summary
|
||||
## Risk Analysis
|
||||
## Summary
|
||||
|
||||
# Security Policies and Models
|
||||
## Security Policies
|
||||
## Security Models
|
||||
### Access Control Models
|
||||
#### IBAC
|
||||
#### RBAC
|
||||
#### ABAC
|
||||
#### Summary
|
||||
### Information Flow Models
|
||||
#### Denning
|
||||
#### MLS
|
||||
#### BLP
|
||||
#### Biba
|
||||
#### Summary
|
||||
### Non-interference Models
|
||||
### Hybrid Models
|
||||
#### Brewer-Nash
|
||||
#### LR-CW
|
||||
#### MLS-CW
|
||||
|
||||
# Practical Security Engineering
|
||||
## Model Engineering
|
||||
## Model Specification
|
||||
### CorPS
|
||||
### SELinux Policy Language
|
||||
## Summary
|
||||
|
||||
# Security Mechanisms
|
||||
## Authorization
|
||||
### Access Control Lists
|
||||
### Capability Lists
|
||||
### Interceptors
|
||||
### Summary
|
||||
## Cryptographic Mechanisms
|
||||
### Encryption
|
||||
#### Symmetric
|
||||
#### Asymmetric
|
||||
### Cryptographic Hashing
|
||||
### Digital Signatures
|
||||
### Cryptographic Attacks
|
||||
## Identification and Authentication
|
||||
### Passwords
|
||||
### Biometrics
|
||||
### Cryptographic Protocols
|
||||
#### SmartCards
|
||||
#### Authentication Protocols
|
||||
## Summary
|
||||
|
||||
# Security Architectures
|
||||
## Design Principles
|
||||
## Operating Systems Architectures
|
||||
### Nizza
|
||||
### SELinux
|
||||
## Distributed Systems Architectures
|
||||
### CORBA
|
||||
### Web Services
|
||||
### Kerberos
|
||||
## Summary
|
Loading…
Reference in New Issue
Block a user