16.01.2015 Views

CS2013-final-report

CS2013-final-report

CS2013-final-report

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IAS Core-Tier1:<br />

• Analyze the tradeoffs of balancing key security properties (Confidentiality,<br />

Integrity, Availability).<br />

• Describe the concepts of risk, threats, vulnerabilities and attack vectors<br />

(including the fact that there is no such thing as perfect security).<br />

• Explain the concept of trust and trustworthiness.<br />

• Recognize that there are important ethical issues to consider in computer<br />

security, including ethical issues associated with fixing or not fixing<br />

vulnerabilities and disclosing or not disclosing vulnerabilities.<br />

• Describe the principle of least privilege and isolation as applied to system design.<br />

• Summarize the principle of fail-safe and deny-by-default.<br />

• Recognize not to rely on the secrecy of design for security (but also that open<br />

design alone does not imply security).<br />

• Explain the goals of end-to-end data security.<br />

• Discuss the benefits of having multiple layers of defenses.<br />

• Recognize that security has to be a consideration from the point of initial design<br />

and throughout the lifecycle of a product.<br />

• Recognize that security imposes costs and tradeoffs.<br />

• Explain why input validation and data sanitization is necessary in the face of<br />

adversarial control of the input channel.<br />

• Explain why you might choose to develop a program in a type-safe language like<br />

Java, in contrast to an unsafe programming language like C/C++.<br />

• Classify common input validation errors, and write correct input validation code.<br />

• Demonstrate using a high-level programming language how to prevent a race<br />

condition from occurring and how to handle an exception.<br />

• Demonstrate the identification and graceful handling of error conditions.<br />

Core-Tier2:<br />

• Describe the concept of mediation and the principle of complete mediation.<br />

• Be aware of standard components for security operations, instead of re-inventing<br />

fundamentals operations.<br />

• Explain the concept of trusted computing including trusted computing base and<br />

attack surface and the principle of minimizing trusted computing base.<br />

• Discuss the importance of usability in security mechanism design.<br />

• Recognize that security does not compose by default; security issues can arise at<br />

boundaries between multiple components.<br />

• Identify the different roles of prevention mechanisms and detection/deterrence<br />

mechanisms.<br />

• Explain the risks with misusing interfaces with third-party code and how to<br />

correctly use third-party code.<br />

• Discuss the need to update software to fix security vulnerabilities and the<br />

lifecycle management of the fix.<br />

• List examples of direct and indirect information flows.<br />

- 216 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!