152 lines
		
	
	
		
			4.1 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			152 lines
		
	
	
		
			4.1 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| - [Introduction](#introduction)
 | |
|   - [Risk Scenarios](#risk-scenarios)
 | |
|   - [Security Goals](#security-goals)
 | |
|   - [Security Engineering](#security-engineering)
 | |
|   - [Lecture Roadmap](#lecture-roadmap)
 | |
| - [Security Requirements](#security-requirements)
 | |
|   - [Vulnerabilities](#vulnerabilities)
 | |
|     - [Human](#human)
 | |
|     - [Organizational](#organizational)
 | |
|     - [Technical](#technical)
 | |
|     - [Summary](#summary)
 | |
|   - [Threats](#threats)
 | |
|     - [Attackers](#attackers)
 | |
|     - [Attack Methods](#attack-methods)
 | |
|     - [Damager Potential](#damager-potential)
 | |
|     - [Summary](#summary-1)
 | |
|   - [Risk Analysis](#risk-analysis)
 | |
|   - [Summary](#summary-2)
 | |
| - [Security Policies and Models](#security-policies-and-models)
 | |
|   - [Security Policies](#security-policies)
 | |
|   - [Security Models](#security-models)
 | |
|     - [Access Control Models](#access-control-models)
 | |
|       - [IBAC](#ibac)
 | |
|       - [RBAC](#rbac)
 | |
|       - [ABAC](#abac)
 | |
|       - [Summary](#summary-3)
 | |
|     - [Information Flow Models](#information-flow-models)
 | |
|       - [Denning](#denning)
 | |
|       - [MLS](#mls)
 | |
|       - [BLP](#blp)
 | |
|       - [Biba](#biba)
 | |
|       - [Summary](#summary-4)
 | |
|     - [Non-interference Models](#non-interference-models)
 | |
|     - [Hybrid Models](#hybrid-models)
 | |
|       - [Brewer-Nash](#brewer-nash)
 | |
|       - [LR-CW](#lr-cw)
 | |
|       - [MLS-CW](#mls-cw)
 | |
| - [Practical Security Engineering](#practical-security-engineering)
 | |
|   - [Model Engineering](#model-engineering)
 | |
|   - [Model Specification](#model-specification)
 | |
|     - [CorPS](#corps)
 | |
|     - [SELinux Policy Language](#selinux-policy-language)
 | |
|   - [Summary](#summary-5)
 | |
| - [Security Mechanisms](#security-mechanisms)
 | |
|   - [Authorization](#authorization)
 | |
|     - [Access Control Lists](#access-control-lists)
 | |
|     - [Capability Lists](#capability-lists)
 | |
|     - [Interceptors](#interceptors)
 | |
|     - [Summary](#summary-6)
 | |
|   - [Cryptographic Mechanisms](#cryptographic-mechanisms)
 | |
|     - [Encryption](#encryption)
 | |
|       - [Symmetric](#symmetric)
 | |
|       - [Asymmetric](#asymmetric)
 | |
|     - [Cryptographic Hashing](#cryptographic-hashing)
 | |
|     - [Digital Signatures](#digital-signatures)
 | |
|     - [Cryptographic Attacks](#cryptographic-attacks)
 | |
|   - [Identification and Authentication](#identification-and-authentication)
 | |
|     - [Passwords](#passwords)
 | |
|     - [Biometrics](#biometrics)
 | |
|     - [Cryptographic Protocols](#cryptographic-protocols)
 | |
|       - [SmartCards](#smartcards)
 | |
|       - [Authentication Protocols](#authentication-protocols)
 | |
|   - [Summary](#summary-7)
 | |
| - [Security Architectures](#security-architectures)
 | |
|   - [Design Principles](#design-principles)
 | |
|   - [Operating Systems Architectures](#operating-systems-architectures)
 | |
|     - [Nizza](#nizza)
 | |
|     - [SELinux](#selinux)
 | |
|   - [Distributed Systems Architectures](#distributed-systems-architectures)
 | |
|     - [CORBA](#corba)
 | |
|     - [Web Services](#web-services)
 | |
|     - [Kerberos](#kerberos)
 | |
|   - [Summary](#summary-8)
 | |
| 
 | |
| # Introduction
 | |
| ## Risk Scenarios
 | |
| ## Security Goals
 | |
| ## Security Engineering
 | |
| ## Lecture Roadmap
 | |
| 
 | |
| # Security Requirements
 | |
| ## Vulnerabilities
 | |
| ### Human
 | |
| ### Organizational
 | |
| ### Technical
 | |
| ### Summary
 | |
| ## Threats
 | |
| ### Attackers
 | |
| ### Attack Methods
 | |
| ### Damager Potential
 | |
| ### Summary
 | |
| ## Risk Analysis
 | |
| ## Summary
 | |
| 
 | |
| # Security Policies and Models
 | |
| ## Security Policies
 | |
| ## Security Models
 | |
| ### Access Control Models
 | |
| #### IBAC
 | |
| #### RBAC
 | |
| #### ABAC
 | |
| #### Summary
 | |
| ### Information Flow Models
 | |
| #### Denning
 | |
| #### MLS
 | |
| #### BLP
 | |
| #### Biba
 | |
| #### Summary
 | |
| ### Non-interference Models
 | |
| ### Hybrid Models
 | |
| #### Brewer-Nash
 | |
| #### LR-CW
 | |
| #### MLS-CW
 | |
| 
 | |
| # Practical Security Engineering
 | |
| ## Model Engineering 
 | |
| ## Model Specification 
 | |
| ### CorPS
 | |
| ### SELinux Policy Language
 | |
| ## Summary
 | |
| 
 | |
| # Security Mechanisms
 | |
| ## Authorization
 | |
| ### Access Control Lists
 | |
| ### Capability Lists
 | |
| ### Interceptors
 | |
| ### Summary
 | |
| ## Cryptographic Mechanisms
 | |
| ### Encryption
 | |
| #### Symmetric
 | |
| #### Asymmetric
 | |
| ### Cryptographic Hashing
 | |
| ### Digital Signatures
 | |
| ### Cryptographic Attacks
 | |
| ## Identification and Authentication
 | |
| ### Passwords
 | |
| ### Biometrics
 | |
| ### Cryptographic Protocols
 | |
| #### SmartCards
 | |
| #### Authentication Protocols
 | |
| ## Summary
 | |
| 
 | |
| # Security Architectures
 | |
| ## Design Principles
 | |
| ## Operating Systems Architectures
 | |
| ### Nizza
 | |
| ### SELinux 
 | |
| ## Distributed Systems Architectures
 | |
| ### CORBA 
 | |
| ### Web Services 
 | |
| ### Kerberos 
 | |
| ## Summary  |