Views
5 years ago

x - Faculty of Computer Science - Technische Universität Dresden

x - Faculty of Computer Science - Technische Universität Dresden

Protection against whom

Protection against whom ? Laws and forces of nature - components are growing old - excess voltage (lightning, EMP) - voltage loss - flooding (storm tide, break of water pipe, heavy rain) - change of temperature ... Human beings - outsider - user of the system - operator of the system - service and maintenance - producer of the system - designer of the system - producer of the tools to design and produce - designer of the tools to design and produce - producer of the tools to design and produce fault tolerance Trojan horse • universal • transitive the tools to design and produce - designer ... includes user, operator, service and maintenance ... of the system used 38

Which protection measures against which attacker ? protection Schutz concerning bzgl. Schutz protection voragainst Entwerfer designer and und producer Produzent der of the Entwurfs- tools to und design Produktionshilfsmittel and produce designer of the system Entwerfer des Systems producer of the system Produzenten des Systems Wartungsdienst service and maintenance operator of the system Betreiber des Systems user of the system Benutzer des Systems Außenstehende outsiders Erwünschtes to achieve the leisten intended Unerwünschtes to prevent the verhindern unintended Zwischensprachen; intermediate languages Zwischenergebnisse, and intermediate die results, unabhängig which are analyzed analysiert independently werden see wie oben above + + mehrere several unabhängige independent designers Entwerfer independent unabhängige analysis Analysen of der the Produkte product Kontrolle control as wie if a bei new neuem product, Produkt, see above s. o. physischen Zugriff restrict physical beschränken, access, logischen Zugriff restrict and log beschränken und logical access protokollieren physischen physical and und logischen logical restriction Zugriff beschränken of access protect physisch the vom system System, physically kryptographisch and protect von the data cryptographically den Daten fernhalten from outsiders 39

faculty of computer science - Fakultät Informatik - Technische ...
Optimierung und Frustration: - Technische Universität Dresden
Statistics beyond Physics - Technische Universität Dresden
Graphs - Www-st.inf.tu-dresden.de - Technische Universität Dresden
OCL By Example Lecture - Technische Universität Dresden
2. Mobile Internet - Faculty of Computer Science - Technische ...
3. Mobile Internet - Faculty of Computer Science - Technische ...
4. Context Awareness - Faculty of Computer Science - Technische ...
Wiki Event Navigation - Computer Networks - Technische Universität ...
Content Sharing - Technische Universität Dresden
7. Location-based Se.. - Faculty of Computer Science - Technische ...
02 - Technische Universität Dresden
3. Adaptation - Faculty of Computer Science - Technische ...
5. Adaptation - Faculty of Computer Science - Technische ...
6. Context Awareness - Faculty of Computer Science - Technische ...
First Presentation - Faculty of Computer Science
Computer Science and Engineering - Technische Universiteit ...
5. Location-based Se.. - Faculty of Computer Science - Technische ...
diplomarbeit - Computer Networks - Technische Universität Dresden
TRANSCRIPT OF RECORDS - Technische Universität Dresden
slides (pdf) - Technische Universität Dresden
TRANSCRIPT OF RECORDS - Technische Universität Dresden