From 1173feae06ee2b8030750b7fa9e2a237ceb8c1d6 Mon Sep 17 00:00:00 2001 From: Robert Jeutter Date: Mon, 26 Apr 2021 21:00:00 +0200 Subject: [PATCH] neue Vorlesung; Inhaltsverzeichnis --- Systemsicherheit.md | 152 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 152 insertions(+) create mode 100644 Systemsicherheit.md diff --git a/Systemsicherheit.md b/Systemsicherheit.md new file mode 100644 index 0000000..6498726 --- /dev/null +++ b/Systemsicherheit.md @@ -0,0 +1,152 @@ +- [Introduction](#introduction) + - [Risk Scenarios](#risk-scenarios) + - [Security Goals](#security-goals) + - [Security Engineering](#security-engineering) + - [Lecture Roadmap](#lecture-roadmap) +- [Security Requirements](#security-requirements) + - [Vulnerabilities](#vulnerabilities) + - [Human](#human) + - [Organizational](#organizational) + - [Technical](#technical) + - [Summary](#summary) + - [Threats](#threats) + - [Attackers](#attackers) + - [Attack Methods](#attack-methods) + - [Damager Potential](#damager-potential) + - [Summary](#summary-1) + - [Risk Analysis](#risk-analysis) + - [Summary](#summary-2) +- [Security Policies and Models](#security-policies-and-models) + - [Security Policies](#security-policies) + - [Security Models](#security-models) + - [Access Control Models](#access-control-models) + - [IBAC](#ibac) + - [RBAC](#rbac) + - [ABAC](#abac) + - [Summary](#summary-3) + - [Information Flow Models](#information-flow-models) + - [Denning](#denning) + - [MLS](#mls) + - [BLP](#blp) + - [Biba](#biba) + - [Summary](#summary-4) + - [Non-interference Models](#non-interference-models) + - [Hybrid Models](#hybrid-models) + - [Brewer-Nash](#brewer-nash) + - [LR-CW](#lr-cw) + - [MLS-CW](#mls-cw) +- [Practical Security Engineering](#practical-security-engineering) + - [Model Engineering](#model-engineering) + - [Model Specification](#model-specification) + - [CorPS](#corps) + - [SELinux Policy Language](#selinux-policy-language) + - [Summary](#summary-5) +- [Security Mechanisms](#security-mechanisms) + - [Authorization](#authorization) + - [Access Control Lists](#access-control-lists) + - [Capability Lists](#capability-lists) + - [Interceptors](#interceptors) + - [Summary](#summary-6) + - [Cryptographic Mechanisms](#cryptographic-mechanisms) + - [Encryption](#encryption) + - [Symmetric](#symmetric) + - [Asymmetric](#asymmetric) + - [Cryptographic Hashing](#cryptographic-hashing) + - [Digital Signatures](#digital-signatures) + - [Cryptographic Attacks](#cryptographic-attacks) + - [Identification and Authentication](#identification-and-authentication) + - [Passwords](#passwords) + - [Biometrics](#biometrics) + - [Cryptographic Protocols](#cryptographic-protocols) + - [SmartCards](#smartcards) + - [Authentication Protocols](#authentication-protocols) + - [Summary](#summary-7) +- [Security Architectures](#security-architectures) + - [Design Principles](#design-principles) + - [Operating Systems Architectures](#operating-systems-architectures) + - [Nizza](#nizza) + - [SELinux](#selinux) + - [Distributed Systems Architectures](#distributed-systems-architectures) + - [CORBA](#corba) + - [Web Services](#web-services) + - [Kerberos](#kerberos) + - [Summary](#summary-8) + +# Introduction +## Risk Scenarios +## Security Goals +## Security Engineering +## Lecture Roadmap + +# Security Requirements +## Vulnerabilities +### Human +### Organizational +### Technical +### Summary +## Threats +### Attackers +### Attack Methods +### Damager Potential +### Summary +## Risk Analysis +## Summary + +# Security Policies and Models +## Security Policies +## Security Models +### Access Control Models +#### IBAC +#### RBAC +#### ABAC +#### Summary +### Information Flow Models +#### Denning +#### MLS +#### BLP +#### Biba +#### Summary +### Non-interference Models +### Hybrid Models +#### Brewer-Nash +#### LR-CW +#### MLS-CW + +# Practical Security Engineering +## Model Engineering +## Model Specification +### CorPS +### SELinux Policy Language +## Summary + +# Security Mechanisms +## Authorization +### Access Control Lists +### Capability Lists +### Interceptors +### Summary +## Cryptographic Mechanisms +### Encryption +#### Symmetric +#### Asymmetric +### Cryptographic Hashing +### Digital Signatures +### Cryptographic Attacks +## Identification and Authentication +### Passwords +### Biometrics +### Cryptographic Protocols +#### SmartCards +#### Authentication Protocols +## Summary + +# Security Architectures +## Design Principles +## Operating Systems Architectures +### Nizza +### SELinux +## Distributed Systems Architectures +### CORBA +### Web Services +### Kerberos +## Summary \ No newline at end of file