Security models Flashcards

1
Q

How can the security of a distributed system be achieved?

A

Securing the processes and channels used for their interactions and protecting the objects that they encapsulate against unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe how objects are protected

A

The server is responsible for enforcing access rights associated with each object and verifying the identity of the principal behind each request
The client may check the identity of the principal behind the server (server authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe how processes and communication is secured

A

Making sure the processes are free of bugs and malicious code
Making sure the processes are protected from direct interference from other processes on that machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can security threats be modelled?

A

Postulate an enemy that is capable of sending any messages to any process, reading or copying any message sent between a pair of processes, perhaps also modifying or replacing any message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly