handouts/ho02.tex
changeset 369 6c7996b6b471
parent 366 34a8f73b2c94
child 386 3c69029f4a1c
equal deleted inserted replaced
368:b46f86d95967 369:6c7996b6b471
   505 \url{http://galois.com/wp-content/uploads/2014/11/technical-hack-a-pdf.pdf}
   505 \url{http://galois.com/wp-content/uploads/2014/11/technical-hack-a-pdf.pdf}
   506 \end{center}
   506 \end{center}
   507 
   507 
   508 \end{document}
   508 \end{document}
   509 
   509 
       
   510 %unikernels for e-voting
       
   511 Trust, trustworthiness, and the TCB
       
   512 
       
   513 The notion of trust is important in security. It is also a source of
       
   514 confusion, especially if people are sloppy in their terminology, and
       
   515 do not distinguish between trust and trustworthiness.
       
   516 
       
   517 Depending on your point of view, trust can be something good and
       
   518 desirable, or something bad and undesirable. Trust between parties is
       
   519 good in that it enables easy interaction and good collaboration
       
   520 between them. However, trust is bad in that trust in another party
       
   521 means that party can do damage to you, if it turns out not to be
       
   522 trustworthy. For example, if you give someone your bankcard and tell
       
   523 them your PIN code, you trust them; this can be useful, for instance
       
   524 if you want them to do some shopping for you, but is clearly also
       
   525 potentially dangerous.
       
   526 
       
   527 Note that if a party is not trustworthy, then it may be so
       
   528 unintentionally (because it is careless or, in the case of software,
       
   529 riddled with security vulnerabilities) or intentionally (because it is
       
   530 downright malicious).  When considering a system that is meant to meet
       
   531 some security objectives, it is important to consider which parts of
       
   532 that system are trusted in order to meet that objective. This called
       
   533 the Trusted Computing Base or TCB.  Ideally, the TCB should be as
       
   534 small as possible. The smaller the TCB, the less likely that it
       
   535 contains security vulnerabilities. (Still, you should never under-
       
   536 estimates people’s stupidity – or an attacker’s creativity – to
       
   537 introduce security vulnerabilities in even the smallest piece of
       
   538 software.) Also, the smaller the TCB, the less effort it takes to get
       
   539 some confidence that it is trustworthy, for example, in the case of
       
   540 software, by doing a code review or by performing some (penetration)
       
   541 testing.
       
   542 
       
   543 
   510 %%% Local Variables: 
   544 %%% Local Variables: 
   511 %%% mode: latex
   545 %%% mode: latex
   512 %%% TeX-master: t
   546 %%% TeX-master: t
   513 %%% End: 
   547 %%% End: