16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Security</strong> Defined 211<br />

9.2 What Can We Do?<br />

In the face of all these adversities, what can we do to make the system less vulnerable?<br />

We will look at the basics of computer security from a general level to familiarize the<br />

reader with the concepts that will be reiterated in the chapters to come. Even more<br />

experienced readers may find this useful as a review before delving into the specifics of<br />

network and Internet security.<br />

9.3 Access Control and the Origins of Computer <strong>Security</strong> Theory<br />

In their seminal computer security paper, “ The Protection of Information and Computer<br />

Systems, ” (Saltzer 1976), Saltzer and Schroeder recorded the beginning concepts of<br />

access control, using the theory that it is better to deny access to all resources by default<br />

and instead explicitly allow access to those resources, rather than attempt to explicitly<br />

deny access rights. 2 The reason for this, which may be obvious to you, is that it is<br />

impossible to know all the possible entities that will attempt access to the protected<br />

resources, and the methods through which they gain this access. The problem is that it<br />

only takes one forgotten rule of denial to compromise the security of the entire system.<br />

Strict denial to all resources guarantees that only those individuals or organizations given<br />

explicit access to the resources will be able to have access. The system is then designed<br />

so that access to specific resources can be granted to specific entities. This control of<br />

resources is the fundamental idea behind computer security, and is commonly referred to<br />

as access control .<br />

Over the years, computer scientists have formalized the idea of access control, building<br />

models and mathematically proving different policies. The most versatile and widely used<br />

model is called the access control matrix . Shown in Figure 9.1 , the access control matrix<br />

is comprised of a grid, with resources on one axis and entities that can access those<br />

resources on the other. The entries in the grid represent the rights those entities have over<br />

the corresponding resources. Using this model, we can represent all security situations for<br />

any system. Unfortunately, the sheer number of possibilities makes it very difficult to use<br />

for any practical purposes in its complete form (representing all resources and possible<br />

2<br />

This idea, by the authors ’ admission, had been around since at least 1965.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!