1. Although the principles seem simple, the mechanisms needed to meet these requirements are complex and require subtle reasoning. 2. Consider potential attacks on security features, b/c successful attacks are designed by looking @ the prob. In new ways and exploiting an unexpected weakness in the mechanism. 3. The procedures used to provide particular services are often counterintuitive and complex 4. The location of the security mechanism matters Physical placement = points in a network that need the security mechanism Logical sense = at what layer/ layers of an architecture such as TCP/IP (Transmission Control Protocol/Internet Protocol should mechanisms be placed) 5. In addition to security mechanisms, participants should also be in possession of secret information (encryption keys), raising questions about the creation, distribution + protection of the secret information. - A potential obstacle may result from the reliance on communications protocols whose behavior may complicate the task of developing the security mechanism. - Ex: proper functioning of the security mechanism, requires setting time limits on the transit time of a message from sender to receiver, then any protocol/network that introduces variable, unpredictable delays may render such time limits meaningless. 6. The attacker has an advantage b/c only need to find 1 weakness, while the designer must find and eliminate all weaknesses to achieve perfect security. 7. There is a tendency of users + system managers to perceive little benefit from security investment until a security failure occurs. 8. Security requires regular, even constant monitoring, and this is difficult in today's short-term and overloaded environment. 9. Security is often an afterthought to be incorporated into a system after the design is complete, rather than being an integral part of the design process. 10. Many users + security administrators view strong security as an impediment to efficient + user-friendly operation of an information system or use of information. The process of identifying risks to organizational operations TASK 5-1 TASK 6-1 |