Guarding the Castle Keep: Teaching with the Fortress Metaphor

نویسندگان

  • Deborah A. Frincke
  • Matt Bishop
چکیده

precise. Understanding the differences between the metaphor of a fortress and the realities of securing a system is crucial to students understanding the subtleties of computer security. In this department, we discuss the fortress metaphor as a pedagogical tool, both how it succeeds and how it fails to aid student understanding. A goal of computer security is to prevent people from violating a site's security policy. Managers and security experts believe that the greatest threat arises from unauthorized system access or use, or authorized limited system usage. This leads to the paradigm of fortress-based security. Fortifying a structure provides safety because defenders believe that attackers will have difficulty overcoming the fortifications. Fortifying usually involves layer-ing the defenses: a moat, for example, surrounds a castle wall, and a castle wall might consist of several different walls. This is analogous to traditional computer security mechanisms. In computer security terms, the principle of separation of privilege requires an entity to satisfy multiple conditions to obtain privileges (such as access). For instance, to log in to a system, someone must have both a valid username and password. This idea leads to security mechanism lay-ering. Using a firewall to protect a site is such an example. The fortress metaphor can explain this concept further. The firewall acts as the forti-fication's outside wall. Each computer system inside the defensive perimeter has its own security mechanisms in place. In some installations , multiple firewalls provide a (restricted) area for external access and a secure inner area for the site. For those students who know mythology, we can use our fortress metaphor to explain the reason behind the name " Trojan Horse " and how that attack works. This story can be particularly effective in liven-ing up an otherwise dry discussion of technique: " The Greeks could not breach the walls of Troy, so they used deception to enter the city. They built a wooden horse big enough to hide soldiers inside it, and tricked the Trojans into dragging the horse through the city gates. That night, the soldiers crept out of the horse, and opened the gates for the Greeks, who promptly sacked the city. " The computer security analogy is, of course, a program that a user executes. The program performs some action a user intends (displaying a mail message), and some other unintended action (mailing a copy to everyone in the user's address book). The …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

General characteristics of geometric patterns and knotting designs in roof Qajar palace-fortress of Chaharmahal and Bakhtiari Province

Knotting designs ornaments and geometric patterns in Islamic art have many common features. Perfection and implementation of knotting designs ornaments and the use of geometric patterns in Islamic Iran both refer to the Seljuk period. Qajar-era Chinese knot ornaments and geometric patterns had many ups and downs connected with the arrival of wild-Maby. During that period Iranian culture was und...

متن کامل

Review of the City of Khiva: Manifestation of Iranian Culture and Civilization in the Region of Khwarezm

Khiva has such a resemblance with Iranian art, culture, and civilization and it will not be irrelevant to consider it as a gemstone in the field of culture and civilization of Iran in Transoxiana. This city is located in the Khwarezm. Reviews tell of earlier historical and cultural links of Khwarezm with Iran. Khwarezm name has come in the Achaemenid inscriptions.Khiva is a city with a plethora...

متن کامل

Summary of the evolution of the fortifications of Santa Barbara Castle in Alicante from its origins to the beginning of the eighteenth century

Since ancient times, Alicante has been considered a strategic location on the east coast of Spain. Situated close to the sea, it is protected to the southeast by the Cape of Huerta and to the southwest by the Cape of Santa Pola. The city lies at the foot of Mount Benacantil, a high outcrop which has been the site of defensive buildings since time immemorial due to its naturally strong position:...

متن کامل

The Dual Meaning Potential of Prepositional Grammatical Metaphor in Prose Fiction

From a Systemic Functional perspective, Grammatical Metaphor (GM) as is taken to be a chief driving force in the discourse of different genres, an important adult language machinery for ideational meanings to be semantically cross-mapped and realized through a different form in the stratum of the lexico-grammar, in order to convey changed meanings and tinker with the discursive flow and develop...

متن کامل

Using the Castle Metaphor to Communicate Basic Concepts in Cybersecurity Education

This paper explores how to use the castle as a metaphor to help students and non-technical users understand some basic concepts of cybersecurity. Castles are symbols of security that are familiar to and easily understood by most people. Important defensive structures for many centuries, castles were designed and built using much ingenuity and effort and are not the simple-minded structures that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Security & Privacy

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2004