neue Vorlesung; Inhaltsverzeichnis
This commit is contained in:
parent
f4e6d96450
commit
1173feae06
152
Systemsicherheit.md
Normal file
152
Systemsicherheit.md
Normal file
@ -0,0 +1,152 @@
|
|||||||
|
- [Introduction](#introduction)
|
||||||
|
- [Risk Scenarios](#risk-scenarios)
|
||||||
|
- [Security Goals](#security-goals)
|
||||||
|
- [Security Engineering](#security-engineering)
|
||||||
|
- [Lecture Roadmap](#lecture-roadmap)
|
||||||
|
- [Security Requirements](#security-requirements)
|
||||||
|
- [Vulnerabilities](#vulnerabilities)
|
||||||
|
- [Human](#human)
|
||||||
|
- [Organizational](#organizational)
|
||||||
|
- [Technical](#technical)
|
||||||
|
- [Summary](#summary)
|
||||||
|
- [Threats](#threats)
|
||||||
|
- [Attackers](#attackers)
|
||||||
|
- [Attack Methods](#attack-methods)
|
||||||
|
- [Damager Potential](#damager-potential)
|
||||||
|
- [Summary](#summary-1)
|
||||||
|
- [Risk Analysis](#risk-analysis)
|
||||||
|
- [Summary](#summary-2)
|
||||||
|
- [Security Policies and Models](#security-policies-and-models)
|
||||||
|
- [Security Policies](#security-policies)
|
||||||
|
- [Security Models](#security-models)
|
||||||
|
- [Access Control Models](#access-control-models)
|
||||||
|
- [IBAC](#ibac)
|
||||||
|
- [RBAC](#rbac)
|
||||||
|
- [ABAC](#abac)
|
||||||
|
- [Summary](#summary-3)
|
||||||
|
- [Information Flow Models](#information-flow-models)
|
||||||
|
- [Denning](#denning)
|
||||||
|
- [MLS](#mls)
|
||||||
|
- [BLP](#blp)
|
||||||
|
- [Biba](#biba)
|
||||||
|
- [Summary](#summary-4)
|
||||||
|
- [Non-interference Models](#non-interference-models)
|
||||||
|
- [Hybrid Models](#hybrid-models)
|
||||||
|
- [Brewer-Nash](#brewer-nash)
|
||||||
|
- [LR-CW](#lr-cw)
|
||||||
|
- [MLS-CW](#mls-cw)
|
||||||
|
- [Practical Security Engineering](#practical-security-engineering)
|
||||||
|
- [Model Engineering](#model-engineering)
|
||||||
|
- [Model Specification](#model-specification)
|
||||||
|
- [CorPS](#corps)
|
||||||
|
- [SELinux Policy Language](#selinux-policy-language)
|
||||||
|
- [Summary](#summary-5)
|
||||||
|
- [Security Mechanisms](#security-mechanisms)
|
||||||
|
- [Authorization](#authorization)
|
||||||
|
- [Access Control Lists](#access-control-lists)
|
||||||
|
- [Capability Lists](#capability-lists)
|
||||||
|
- [Interceptors](#interceptors)
|
||||||
|
- [Summary](#summary-6)
|
||||||
|
- [Cryptographic Mechanisms](#cryptographic-mechanisms)
|
||||||
|
- [Encryption](#encryption)
|
||||||
|
- [Symmetric](#symmetric)
|
||||||
|
- [Asymmetric](#asymmetric)
|
||||||
|
- [Cryptographic Hashing](#cryptographic-hashing)
|
||||||
|
- [Digital Signatures](#digital-signatures)
|
||||||
|
- [Cryptographic Attacks](#cryptographic-attacks)
|
||||||
|
- [Identification and Authentication](#identification-and-authentication)
|
||||||
|
- [Passwords](#passwords)
|
||||||
|
- [Biometrics](#biometrics)
|
||||||
|
- [Cryptographic Protocols](#cryptographic-protocols)
|
||||||
|
- [SmartCards](#smartcards)
|
||||||
|
- [Authentication Protocols](#authentication-protocols)
|
||||||
|
- [Summary](#summary-7)
|
||||||
|
- [Security Architectures](#security-architectures)
|
||||||
|
- [Design Principles](#design-principles)
|
||||||
|
- [Operating Systems Architectures](#operating-systems-architectures)
|
||||||
|
- [Nizza](#nizza)
|
||||||
|
- [SELinux](#selinux)
|
||||||
|
- [Distributed Systems Architectures](#distributed-systems-architectures)
|
||||||
|
- [CORBA](#corba)
|
||||||
|
- [Web Services](#web-services)
|
||||||
|
- [Kerberos](#kerberos)
|
||||||
|
- [Summary](#summary-8)
|
||||||
|
|
||||||
|
# Introduction
|
||||||
|
## Risk Scenarios
|
||||||
|
## Security Goals
|
||||||
|
## Security Engineering
|
||||||
|
## Lecture Roadmap
|
||||||
|
|
||||||
|
# Security Requirements
|
||||||
|
## Vulnerabilities
|
||||||
|
### Human
|
||||||
|
### Organizational
|
||||||
|
### Technical
|
||||||
|
### Summary
|
||||||
|
## Threats
|
||||||
|
### Attackers
|
||||||
|
### Attack Methods
|
||||||
|
### Damager Potential
|
||||||
|
### Summary
|
||||||
|
## Risk Analysis
|
||||||
|
## Summary
|
||||||
|
|
||||||
|
# Security Policies and Models
|
||||||
|
## Security Policies
|
||||||
|
## Security Models
|
||||||
|
### Access Control Models
|
||||||
|
#### IBAC
|
||||||
|
#### RBAC
|
||||||
|
#### ABAC
|
||||||
|
#### Summary
|
||||||
|
### Information Flow Models
|
||||||
|
#### Denning
|
||||||
|
#### MLS
|
||||||
|
#### BLP
|
||||||
|
#### Biba
|
||||||
|
#### Summary
|
||||||
|
### Non-interference Models
|
||||||
|
### Hybrid Models
|
||||||
|
#### Brewer-Nash
|
||||||
|
#### LR-CW
|
||||||
|
#### MLS-CW
|
||||||
|
|
||||||
|
# Practical Security Engineering
|
||||||
|
## Model Engineering
|
||||||
|
## Model Specification
|
||||||
|
### CorPS
|
||||||
|
### SELinux Policy Language
|
||||||
|
## Summary
|
||||||
|
|
||||||
|
# Security Mechanisms
|
||||||
|
## Authorization
|
||||||
|
### Access Control Lists
|
||||||
|
### Capability Lists
|
||||||
|
### Interceptors
|
||||||
|
### Summary
|
||||||
|
## Cryptographic Mechanisms
|
||||||
|
### Encryption
|
||||||
|
#### Symmetric
|
||||||
|
#### Asymmetric
|
||||||
|
### Cryptographic Hashing
|
||||||
|
### Digital Signatures
|
||||||
|
### Cryptographic Attacks
|
||||||
|
## Identification and Authentication
|
||||||
|
### Passwords
|
||||||
|
### Biometrics
|
||||||
|
### Cryptographic Protocols
|
||||||
|
#### SmartCards
|
||||||
|
#### Authentication Protocols
|
||||||
|
## Summary
|
||||||
|
|
||||||
|
# Security Architectures
|
||||||
|
## Design Principles
|
||||||
|
## Operating Systems Architectures
|
||||||
|
### Nizza
|
||||||
|
### SELinux
|
||||||
|
## Distributed Systems Architectures
|
||||||
|
### CORBA
|
||||||
|
### Web Services
|
||||||
|
### Kerberos
|
||||||
|
## Summary
|
Loading…
Reference in New Issue
Block a user