Agenda Midterm Notes Taco Bell Case Chapter 5 Computer Security
Taco Bell Case - Questions Why is this an example of proper scoping of functions? Would you have used “evolution” or “revolution” to update the infrastructure? What maintains control given the decentralized decision process?
Chapter 5 Highlights Infrastructure effects the ability to differentiate Metcalfs’s Law Over focus on “realtime” Complex systems increase process failure probability: redundancy? Net Services as “utility”
Computer Security Basics Identification/Authentication/Access Audit Directory Services: LDAP
Network Security Basics Single sign-on Trusted machines Firewalls TCP/IP Secure Ports/sockets
Single Sign-on Security Server Application Server User/Client : Login to SS 2: Get token 3: login to AS (pass token) 4: AS chk token 5: SS ok’s token
Router Firewall Firewall Router Accept List / Exclude list From: To: Type: Telnet From: To: Type: Telnet
Routed Network Design Router I-net router Client LAN Router Campus Backbone
Encryption Asymmetric keys Public / private keys Digital Certificates SSL / HTTPS Secured Transactions
PKI Process PKI Service PKI Client Send Public key Return encoded symmetric key Send login req using sym key Conduct work Time’s up! Send new sym key info
VPN / Remote Access Goals VPN Mechanism VPN Problems Proxy Server