Skip to content

Latest commit

 

History

History
21 lines (14 loc) · 911 Bytes

time-based-security.md

File metadata and controls

21 lines (14 loc) · 911 Bytes

Notes on "Time Based Security"

A book by Winn Schwartau

CH5: A brief history of security models

  • The "Orange Book" introduces the reference monitor, or something that either accepts or denies every access request
  • On a computer, an example may be a process requesting a file descriptor or network socket
  • This kind of mandatory access control made sense for the military but not for the private sector
  • Schwartau calls this an example of a Fortress Mentality, or "prevent everything"

CH8: Fast forward one century

  • Vaults are not 100% secure. They can be broken into
  • The purpose of a vault is not to secure something on its own
  • It's to prevent the robbers from stealing what's inside before the police come

CH9: The PDR security formula

  • Pt > Dt + Rt
  • The amount of time offered by the prevention controls must exceed the amount of time it takes to detect and respond to the attack