wenbing@ieee.org
Outline
Basic terminology
Dependability concepts
Attributes
Fault, error, and failure
Approaches to achieving dependability
Security concepts
Attributes
Vulnerabilities, threats, attacks, and controls
11/17/15
http://proquest.safaribooksonline.com/0132390779
Wenbing Zhao
Terminology
11/17/15
System
System Boundary
Environment
Wenbing Zhao
Terminology
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
Quantitative Dependability
Measures
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
Quantitative Dependability
Measures
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
Fault
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
Approaches to Achieving
Dependability
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
Confidentiality
11/17/15
Wenbing Zhao
Integrity
Integrity mechanisms:
Prevention mechanisms:
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
Availability
An aspect of reliability
Also an aspect of system design: an unavailable system is at
least as bad as no system at all
11/17/15
Wenbing Zhao
Availability
11/17/15
Wenbing Zhao
Relationship of Security
Goals
11/17/15
Wenbing Zhao
Relationship of Security
Goals
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
Type of Threats
11/17/15
Wenbing Zhao
Type of Threats
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
Methods of Defense
11/17/15
Wenbing Zhao
Methods of Defense
11/17/15
Wenbing Zhao
11/17/15
Wenbing Zhao
Countermeasures / Controls
Encryption
Software controls
Hardware controls
Scrambling process
Physical Controls
11/17/15
Wenbing Zhao