@@ -198,7 +198,7 @@ pioneers are interviewed.
198198 <https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/> `__.
199199 The Washington Post, May 30, 2015.
200200
201- 1.2 Trust and Threats
201+ 1.2 Threats and Trust
202202----------------------
203203
204204A discussion of security often begins with an analysis of the *threat
@@ -258,29 +258,46 @@ applicable to system security.
258258 B. Schneier. Beyond Fear: Thinking Sensibly About Security in an
259259 Uncertain World. Copernicus Books, 2003.
260260
261- Finally, it is important to recognize that trust and threats are two
262- sides of the same coin. A threat is a potential failure scenario that
263- you design your system to avoid, and trust is an assumption you make
264- about how external actors and internal components you build upon will
261+ It is also important to recognize that threats and trust are two sides
262+ of the same coin. A threat is a potential failure scenario that you
263+ design your system to avoid, and trust is an assumption you make about
264+ how external actors and internal components you build upon will
265265behave. For example, if you plan to transmit messages over Wi-Fi on an
266266open campus, you would likely identify an eavesdropper that can
267267intercept messages as a threat (and adopt some of the methods
268268discussed in this book as a countermeasure). But if you are planning
269269to transmit messages over a fiber link between two machines in a
270- locked datacenter, you might trust that channel is secure, and so take
271- no additional steps. Every system makes trust assumptions, even if it
272- as simple as trusting the computer you just bought from a reputable
273- vendor does not forward your data to an adversary. The key is
274- to be as explicit as possible about those assumptions, because they
275- may change over time.
276-
270+ locked machine room, you might trust that channel is secure, and so
271+ take no additional steps. Every system makes trust assumptions. The
272+ key is to be as explicit as possible about those assumptions, because
273+ they may change over time.
274+
275+ Taking this thought process a step further, trust assumptions aren't
276+ always as clear-cut as this strawman suggests. For example, most of us
277+ implicitly trust that the computer we just bought from a reputable
278+ vendor does not forward our data to an adversary, but for some use
279+ cases, the hardware supply chain is a consideration. Buying time on
280+ virtual machines in a cloud only complicates this decision. Even when
281+ you trust the hardware, you might or might not trust the firmware or
282+ the OS (or you might trust it only when certain security enhancements
283+ are enabled). This illustrates a common design question that every
284+ system must face: What do you accept to be the *Trusted Computing Base
285+ (TCB) *; that is, what hardware and software components do you trust?
286+
287+ We revisit this topic in the next chapter, but given that this book
288+ focuses on network security, a reasonable starting point is to trust
289+ the hardware/software on the systems you control, and to assume all
290+ other systems you interact with are untrustworthy. But this definition
291+ is problematic in a service-based environment like today's Internet,
292+ where we end up also putting some amount of trust in the network
293+ providers we connect to, and the cloud services we depend upon. In
294+ many respects, identifying a TCB that meets our needs is an important
295+ part of what makes security so challenging.
277296
278297
2792981.3 Threats to Network Security
280299-------------------------------
281300
282-
283-
284301.. from the original book chapter - somewhat edited to follow the above text
285302
286303 Computer networks are, as we noted above, invariably a shared
0 commit comments