Changes between Version 5 and Version 6 of EducationalAssignments/PrivateWritePartTwo

Changes between Version 5 and Version 6 of EducationalAssignments/PrivateWritePartTwo

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 5 and Version 6 of EducationalAssignments/PrivateWritePartTwo

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 5 and Version 6 of EducationalAssignments/PrivateWritePartTwo

Show
Ignore:
Timestamp:
11/03/12 22:40:47 (7 years ago)
Author:
aman
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • EducationalAssignments/PrivateWritePartTwo

    v5 v6  
    22= Security layer testing and penetration =   
    33 
    4 In this assignment you will learn how to attack a reference monitor.  The reference monitor you will be testing uses the security layer framework (encasement library, etc.) for the Seattle testbed.  It is possible to do this assignment separately however it is recommended that this assignment be you completed after [wiki:EducationalAssignments/PrivateWritePartOne PrivateWritePartOne].  Either way you should already have a working security layer or access to one.  Testing the security layer is done by running a series of test cases that an adversary may use to circumvent your system. This assignment is intended to prepare you for thinking about security paradigms in a functional way. The ideas of information, security and privacy have been embedded into the steps of this assignment. 
     4In this assignment you will learn how to attack a reference monitor.  The reference monitor you will be testing uses the security layer framework (encasement library, etc.) for the Seattle testbed.  It is possible to do this assignment separately however it is recommended that this assignment be completed after [wiki:EducationalAssignments/PrivateWritePartOne PrivateWritePartOne].  Either way you should already have a working security layer or access to one.  Testing the security layer is done by running a series of test cases that an adversary may use to circumvent your system. This assignment is intended to prepare you for thinking about security paradigms in a functional way. The ideas of information, security and privacy have been embedded into the steps of this assignment. 
    55 
    66[[TOC(inline)]]