Lecture 2
Lecture 2
Information Security
Trust and Assumptions
• Underlie all aspects of security
• Policies
• Unambiguously partition system states
• Correctly capture security requirements
• Mechanisms
• Assumed to enforce policy
• Support mechanisms work correctly
Threats
Policy
Specification
Design
Implementation
Operation