>>2296>Notes:Security: Achieving some goal when there is an adversary present.
When can divided into three parts:
I. Policy: The goal you want to achieve. The statement about what I want my system to be able to do.
Examples:
Confidentiality: "Only I should be able to read the grades file for 6.858"
Integrity: "Only the staff can upload the final grades"
Availiability: "A web site should be available even while the adversary try to take it down"
II. Threat Model: What is the adversary thinking about? Assumptions. Modelling their own goals.
Examples:
"The adv. doesn't know the password."
"The adv. doesn't have physical access to the phone, keys or laptop."
III. Mechanism: Software, Hardware or System design implementation where our policy is followed as long the adversary follows the threat model.
How is the policy vulnerable?
Example: Recovery questions.