- [Introduction](#introduction) - [Risk Scenarios](#risk-scenarios) - [Security Goals](#security-goals) - [Security Engineering](#security-engineering) - [Lecture Roadmap](#lecture-roadmap) - [Security Requirements](#security-requirements) - [Vulnerabilities](#vulnerabilities) - [Human](#human) - [Organizational](#organizational) - [Technical](#technical) - [Summary](#summary) - [Threats](#threats) - [Attackers](#attackers) - [Attack Methods](#attack-methods) - [Damager Potential](#damager-potential) - [Summary](#summary-1) - [Risk Analysis](#risk-analysis) - [Summary](#summary-2) - [Security Policies and Models](#security-policies-and-models) - [Security Policies](#security-policies) - [Security Models](#security-models) - [Access Control Models](#access-control-models) - [IBAC](#ibac) - [RBAC](#rbac) - [ABAC](#abac) - [Summary](#summary-3) - [Information Flow Models](#information-flow-models) - [Denning](#denning) - [MLS](#mls) - [BLP](#blp) - [Biba](#biba) - [Summary](#summary-4) - [Non-interference Models](#non-interference-models) - [Hybrid Models](#hybrid-models) - [Brewer-Nash](#brewer-nash) - [LR-CW](#lr-cw) - [MLS-CW](#mls-cw) - [Practical Security Engineering](#practical-security-engineering) - [Model Engineering](#model-engineering) - [Model Specification](#model-specification) - [CorPS](#corps) - [SELinux Policy Language](#selinux-policy-language) - [Summary](#summary-5) - [Security Mechanisms](#security-mechanisms) - [Authorization](#authorization) - [Access Control Lists](#access-control-lists) - [Capability Lists](#capability-lists) - [Interceptors](#interceptors) - [Summary](#summary-6) - [Cryptographic Mechanisms](#cryptographic-mechanisms) - [Encryption](#encryption) - [Symmetric](#symmetric) - [Asymmetric](#asymmetric) - [Cryptographic Hashing](#cryptographic-hashing) - [Digital Signatures](#digital-signatures) - [Cryptographic Attacks](#cryptographic-attacks) - [Identification and Authentication](#identification-and-authentication) - [Passwords](#passwords) - [Biometrics](#biometrics) - [Cryptographic Protocols](#cryptographic-protocols) - [SmartCards](#smartcards) - [Authentication Protocols](#authentication-protocols) - [Summary](#summary-7) - [Security Architectures](#security-architectures) - [Design Principles](#design-principles) - [Operating Systems Architectures](#operating-systems-architectures) - [Nizza](#nizza) - [SELinux](#selinux) - [Distributed Systems Architectures](#distributed-systems-architectures) - [CORBA](#corba) - [Web Services](#web-services) - [Kerberos](#kerberos) - [Summary](#summary-8) # Introduction ## Risk Scenarios ## Security Goals ## Security Engineering ## Lecture Roadmap # Security Requirements ## Vulnerabilities ### Human ### Organizational ### Technical ### Summary ## Threats ### Attackers ### Attack Methods ### Damager Potential ### Summary ## Risk Analysis ## Summary # Security Policies and Models ## Security Policies ## Security Models ### Access Control Models #### IBAC #### RBAC #### ABAC #### Summary ### Information Flow Models #### Denning #### MLS #### BLP #### Biba #### Summary ### Non-interference Models ### Hybrid Models #### Brewer-Nash #### LR-CW #### MLS-CW # Practical Security Engineering ## Model Engineering ## Model Specification ### CorPS ### SELinux Policy Language ## Summary # Security Mechanisms ## Authorization ### Access Control Lists ### Capability Lists ### Interceptors ### Summary ## Cryptographic Mechanisms ### Encryption #### Symmetric #### Asymmetric ### Cryptographic Hashing ### Digital Signatures ### Cryptographic Attacks ## Identification and Authentication ### Passwords ### Biometrics ### Cryptographic Protocols #### SmartCards #### Authentication Protocols ## Summary # Security Architectures ## Design Principles ## Operating Systems Architectures ### Nizza ### SELinux ## Distributed Systems Architectures ### CORBA ### Web Services ### Kerberos ## Summary