|
|
|
|
|
|
|
|
|
|
|
|
|
|
¨ |
Provide
definitions for terms like “authorized”, “prompt”,
|
|
|
|
“good
information” and “disclosure”
|
|
|
¨ |
Preferably
in a way that can be automated
|
|
|
|
– |
This
is a critical failing of most computer security policies
|
|
|
¨ |
In
this course, we will restrict our scope of attention to
|
|
|
computer
security policies.
|
|
|
|
– |
We
will assume, for example, that physical access to sensitive
|
|
|
|
portions
of the machine has already been restricted by external
|
|
|
|
mechanisms.
|
|
|
|
– |
We
will assume that authorized users are ``well behaved.’’ This is
|
|
a
questionable assumption, and sometimes inappropriate.
|
|