neue Vorlesung; Inhaltsverzeichnis

This commit is contained in:
WieErWill 2021-04-26 21:00:00 +02:00
parent f4e6d96450
commit 1173feae06

152
Systemsicherheit.md Normal file
View File

@ -0,0 +1,152 @@
- [Introduction](#introduction)
- [Risk Scenarios](#risk-scenarios)
- [Security Goals](#security-goals)
- [Security Engineering](#security-engineering)
- [Lecture Roadmap](#lecture-roadmap)
- [Security Requirements](#security-requirements)
- [Vulnerabilities](#vulnerabilities)
- [Human](#human)
- [Organizational](#organizational)
- [Technical](#technical)
- [Summary](#summary)
- [Threats](#threats)
- [Attackers](#attackers)
- [Attack Methods](#attack-methods)
- [Damager Potential](#damager-potential)
- [Summary](#summary-1)
- [Risk Analysis](#risk-analysis)
- [Summary](#summary-2)
- [Security Policies and Models](#security-policies-and-models)
- [Security Policies](#security-policies)
- [Security Models](#security-models)
- [Access Control Models](#access-control-models)
- [IBAC](#ibac)
- [RBAC](#rbac)
- [ABAC](#abac)
- [Summary](#summary-3)
- [Information Flow Models](#information-flow-models)
- [Denning](#denning)
- [MLS](#mls)
- [BLP](#blp)
- [Biba](#biba)
- [Summary](#summary-4)
- [Non-interference Models](#non-interference-models)
- [Hybrid Models](#hybrid-models)
- [Brewer-Nash](#brewer-nash)
- [LR-CW](#lr-cw)
- [MLS-CW](#mls-cw)
- [Practical Security Engineering](#practical-security-engineering)
- [Model Engineering](#model-engineering)
- [Model Specification](#model-specification)
- [CorPS](#corps)
- [SELinux Policy Language](#selinux-policy-language)
- [Summary](#summary-5)
- [Security Mechanisms](#security-mechanisms)
- [Authorization](#authorization)
- [Access Control Lists](#access-control-lists)
- [Capability Lists](#capability-lists)
- [Interceptors](#interceptors)
- [Summary](#summary-6)
- [Cryptographic Mechanisms](#cryptographic-mechanisms)
- [Encryption](#encryption)
- [Symmetric](#symmetric)
- [Asymmetric](#asymmetric)
- [Cryptographic Hashing](#cryptographic-hashing)
- [Digital Signatures](#digital-signatures)
- [Cryptographic Attacks](#cryptographic-attacks)
- [Identification and Authentication](#identification-and-authentication)
- [Passwords](#passwords)
- [Biometrics](#biometrics)
- [Cryptographic Protocols](#cryptographic-protocols)
- [SmartCards](#smartcards)
- [Authentication Protocols](#authentication-protocols)
- [Summary](#summary-7)
- [Security Architectures](#security-architectures)
- [Design Principles](#design-principles)
- [Operating Systems Architectures](#operating-systems-architectures)
- [Nizza](#nizza)
- [SELinux](#selinux)
- [Distributed Systems Architectures](#distributed-systems-architectures)
- [CORBA](#corba)
- [Web Services](#web-services)
- [Kerberos](#kerberos)
- [Summary](#summary-8)
# Introduction
## Risk Scenarios
## Security Goals
## Security Engineering
## Lecture Roadmap
# Security Requirements
## Vulnerabilities
### Human
### Organizational
### Technical
### Summary
## Threats
### Attackers
### Attack Methods
### Damager Potential
### Summary
## Risk Analysis
## Summary
# Security Policies and Models
## Security Policies
## Security Models
### Access Control Models
#### IBAC
#### RBAC
#### ABAC
#### Summary
### Information Flow Models
#### Denning
#### MLS
#### BLP
#### Biba
#### Summary
### Non-interference Models
### Hybrid Models
#### Brewer-Nash
#### LR-CW
#### MLS-CW
# Practical Security Engineering
## Model Engineering
## Model Specification
### CorPS
### SELinux Policy Language
## Summary
# Security Mechanisms
## Authorization
### Access Control Lists
### Capability Lists
### Interceptors
### Summary
## Cryptographic Mechanisms
### Encryption
#### Symmetric
#### Asymmetric
### Cryptographic Hashing
### Digital Signatures
### Cryptographic Attacks
## Identification and Authentication
### Passwords
### Biometrics
### Cryptographic Protocols
#### SmartCards
#### Authentication Protocols
## Summary
# Security Architectures
## Design Principles
## Operating Systems Architectures
### Nizza
### SELinux
## Distributed Systems Architectures
### CORBA
### Web Services
### Kerberos
## Summary