Chapter 1 Security Engineering TUM
Chapter 1 Security Engineering TUM
Teaching:
https://www22.in.tum.de/lehre/
Exercises:
We cannot force you to do the exercises. However, they will prepare you
for the exam (and hopefully you will learn a lot by doing them).
Integrity
Has data been altered (and I should know this)?
Availability
Is data always accessible?
of data, and then of the systems that process data (including humans).
This distinction is nice, but in practice not clear-cut
https://web.nvd.nist.gov/view/vuln/statistics
Prof. Alexander Pretschner (I22) | Security Engineering | SoSe 2017 22
Security Engineering
Security Engineering = Software Engineering + Information Security
Software Engineering is the application of systematic, quantifiable
approaches to the development, operation, and maintenance of software;
i.e., the application of engineering to software.
Information Security focuses on methods and technologies to reduce risks
to Information Assets.
More refined (adopted from Anderson, Security Engineering)
Security Engineering is about building systems that remain
dependable in the face of malice, error, or mischance. As a discipline,
it focuses on the tools, processes, and methods needed to design,
implement, test, and evolve systems.
Security Engineering is not a mature discipline yet!
That is, that there can be insurances for computer security: insurances
are based on probabilities and expected losses (see insurances for
physical safes)
See the plethora of incident lists that classify vulnerabilities and sometimes
their occurrences (www.cert.org, www.osvdb.org, http://nvd.nist.gov )
We will also introduce/recall aspects from classical safety and discuss their
relation to the security of distributed systems.
Prof. Alexander Pretschner (I22) | Security Engineering | SoSe 2017 31
Safety and Security
Yet, even if there might not be a fundamental difference, there is a lot of
domain knowledge to be gained
writing code for a washing machine also is not fundamentally different
from writing code for an autopilot or a tax report software or a spreadsheet
But experience matters
Requirements Eng.
Design
Implementation
V&V
Op&Maintenance
Evaluation Criteria
D Obvious solution:
Send both
coordinates to
trusted central server
and let decide
cond1 |isrich
cond1 |taxdisc
http://www.owasp.org/index.php/Category:OWASP_Project