¨Just as a policy is
stated in context, implementations are built
under assumptions
¨These assumptions
are:
–Administrative (e.g.
logins will not be given out at random)
–Environmental (e.g. physical access to machine is restricted)
–Threat model: the
attack scenarios you anticipated
•As opposed to the
nuclear attack that you didn’t prepare for
–