Security Engineering: A Guide to Building Dependable Distributed Systems
نویسنده
چکیده
A seal is only as good as the man in whose briefcase it's carried. —KAREN SPÄRCK JONES 12.1 Introduction Many computer systems rely to some extent on secure printing, packaging, and seals to guarantee important aspects of their protection. • Many software products get some protection against forgery, using tricks such as holographic stickers that are supposed to tear when removed from the package. They can raise the costs of large-scale forgery; on the individual scale, a careful implementation can help with trusted distribution, that is, assuring the user that the product hasn't been tampered with since leaving the factory. • We discussed how monitoring systems, such as taximeters, often use seals to make it harder for users to tamper with input. No matter how sophisticated the cryptography, a defeat for the seals can be a defeat for the system. • Many security tokens, such as smartcards, are difficult to make truly tamper-proof. It's often feasible for the opponent to dismantle the device and probe out the content. The realistic goal for such a system may be tamper evidence, rather than tamper proofness: if someone dismantles their smartcard and gets the keys out, that person should not be able to reassemble it into something that will pass close examination. Security printing can be the key technology here. If a bank smartcard really is tamper-evident, then the bank might tell its customers that disputes will be entertained only if they can produce the card intact. (Banks might not get away with this, though, because consumer protection lawyers will demand that they deal fairly with honest customers who lose their cards or have them stolen).
منابع مشابه
Security engineering - a guide to building dependable distributed systems
Security Engineering: A Guide to Building Dependable Distributed Systems Ross Anderson Wiley Computer Publishing This is an upper-level undergraduate, first-year graduate course on network and computer security. This course introduces the principles and practices of cryptography and network security. The first half of the class content covers basic cryptographic methods, key distribution, and p...
متن کاملSecurity Engineering: A Guide to Building Dependable Distributed Systems
In Germany and Turkey they viewed scenes that were particularly distressing. On the runway stood a German (or Turkish) quick-reaction alert airplane loaded with nuclear weapons and with a foreign pilot in the cockpit. The airplane was ready to take off at the earliest warning, and the nuclear weapons were fully operational. The only evidence of U.S. control was a lonely 18-year-old sentry armed...
متن کاملAn ANSA Analysis of Open Dependable Distributed Computing
System dependability is increasing in importance in the market place. A recent report predicts that the market for fault-tolerant systems will double in the next three years. Within the context of large open distributed systems, dependability will be particularly important: the more components a system has the greater the probability that one of those components will be faulty. Over the next tw...
متن کاملSecurity Engineering: A Guide to Building Dependable Distributed Systems
Computers are not (yet?) capable of being reasonable any more than is a Second Lieutenant. Against stupidity, the Gods themselves contend in vain. Banking systems include the back-end bookkeeping systems that record customers' account details and transaction processing systems such as cash machine networks and high-value interbank money transfer systems that feed them with data. They are import...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006