>>2296>Notes:Security: Achieving some goal when there is an adversary present.
When can divided into three parts:    
    I. Policy: The goal you want to achieve. The statement about what I want my system to be able to do.
    Examples: 
    Confidentiality: "Only I should be able to read the grades file for 6.858"
    Integrity: "Only the staff can upload the final grades"
    Availiability: "A web site should be available even while the adversary try to take it down"
    II. Threat Model: What is the adversary thinking about? Assumptions. Modelling their own goals.    
    Examples: 
    "The adv. doesn't know the password."
    "The adv. doesn't have physical access to the phone, keys or laptop." 
    III. Mechanism: Software, Hardware or System design implementation where our policy is followed as long the adversary follows the threat model.     
    How is the policy vulnerable?
    Example: Recovery questions.