Index > Authentication > 2021-02-01: Module 1: Trust and Security Models
There is a huge amount of raw information in this module.
Scenario: You are entering your login credentials to a website on your phone.
You need to trust:
But trust with what? There are different components of trust.
Trust Anchor - something for which trust is assumed, not derived.
Not every component of a computer can be trusted. So, we can isolate and trust the security components.
Note that trust does not make something secure
The TCB should be separated from the rest of the computer by a security perimeter. Access must be protected by a reference monitor. This is typically implemented as a security kernel in an OS.
Apple uses a “secure enclave”
A domain is a set of objects that a given subject has access to. Modern OS’s use “protection rings” to show domain boundaries. (It’s not just user and kernel space).
My chatbot process (the subject) asks the reference monitor for its database file. The kernel does the actual reading from the disk, and returns the data - but only if the process has the correct permissions to access the files it asked for.
Trusted Computer System Evaluation Criteria
The book sets forth criteria for evaluating the security of an operating system. One such rule requires the presence of a reference monitor, which controls subjects access to resources.
Levels:
During this section, Prof. opened a jar for his daughter. And the zoom chat did rejoice.
Assurance mechanisms guarantee the previous requirements are fulfilled, and that the trusted system is validated as secure/not secure.
Assurance can come from multiple mechanisms:
Prof. did not expand on those points.
“Is it a zero or a one - that’s security. How do we know it is what we think it is? That’s assurance.” - Prof.
It has something to do with VMs.
Recall, the reference monitor is the guardian between an applicant (like a userland process) and some protected resource (like OS syscalls)
What do these mean? Hopefully we find out next class.
Module 1 quiz, due Feb. 13th. 2 hours allocated.
There is a second discussion post:
Lectures are on Monday, group work is on Wednesdays.
There’s also a list of videos that should be watched by Saturday.
Source summary 1 due Feb 13th.
TL;DR: Go scour every inch of MyCourses for due dates, because they’re everywhere.
Index > Authentication > 2021-02-01: Module 1: Trust and Security Models