|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
¨ |
Just
as a policy is stated in context,
|
|
|
|
implementations
are built under assumptions
|
|
|
¨ |
These
assumptions are:
|
|
|
|
– |
Administrative
(e.g. logins will not be given out at
|
|
|
|
random)
|
|
|
|
– |
Environmental
(e.g. physical access to machine is
|
|
|
|
restricted)
|
|
|
|
– |
Threat
model: the attack scenarios you anticipated
|
|
|
|
• |
As
opposed to the nuclear attack that you didn’t prepare for
|