Skip to content

Commit 5962a8a

Browse files
committed
70004 & 70046: added friday ADSD lecture and advanced security
1 parent f6f06b8 commit 5962a8a

39 files changed

+49
-1
lines changed

70004 - Advanced Computer Security/1975 Design Principles.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,3 @@ Covers the evolution of basic computer security principles.
88
> - Earl Boebert
99
## Commentary
1010
- *Defence in depth* seems often overlooked (having multiple layers of defences in a system), having *Compromise recording* seems to be in this vein also.
11-
-
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
## Definition
2+
Being able to determine the attacker or [[Principle]].
3+
- Audit trails and logs, even in security failure there is a need to detect in order to react, and investigate after is system is re-secured.
4+
- Secure timestamping (e.g. using OS, or network, attacker may attempt to damage integrity of logs)
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
## Definition
2+
The uptime of a system.
3+
- Maximum traffic, measured historically and guaranteed by SLAs with providers.
4+
- Using redundancy to reduce possible single points of failure (e.g. replicating databases, auto-scaling for load)
5+
Many attacks are [[Denial of Service]].
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
## Definition
2+
Using multiple layers of security, and monitoring to remove single points of failure for security.
3+
## Example
4+
### Account monitoring
5+
- Using password authentication for accounts.
6+
- Monitor number of denied logins, conservatively blocking clients that fail to log in repeatedly.
7+
- Monitor logins for suspicious activity, and block judiciously.
8+
- Monitor suspected compromised accounts.
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
## Definition
2+
Overwhelming public services with large volumes of illegitimate traffic to prevent them servicing legitimate traffic.
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
## Definition
2+
> *Alice wants to prove to Trent she did communicate with Bob*
3+
4+
Collecting undeniable evidence of some transaction.
5+
- receipts, digitally signed logs
6+
- helps with [[Accountability]], and for investigations (e.g. determining if a transaction was fraudulent, or valid based on an untrusted customer's testimony).

0 commit comments

Comments
 (0)