Posts

Showing posts from May, 2011

The big Red Button

DOM Sicherheitstechnik has been around since 1936, that is to say they existed before WWII, one may even argue that the choice to use a “Dual Key” authentication mechanism was a result of their design; since they were the first Lock company to design a key that had two half and was increasingly difficult if not impossible to pick. [DOM] i In any military action where dual controls were needed, DOM keys were probably used up until a better option became available. In addition to the dual controls all encrypted messages would have been executed according to a protocol in a per-established manner. A PAL is a complicated firring mechanism usually for a nuclear weapon; Weapons control is the core business of any military; as once stated all wars are 99% logistics and 1% destruction. Therefore a PAL's main goal is authentication, and enforcement of the chain of command in a given military to control a sensitive munition during it's logistical operations and execution in theater...

Security Models and Mechanisams

Image
The nature of all computer systems security relies upon systems access and how privileges are granted to a given user object or application program to system subject. Most security models are designed around the Subject, Object and User permission. Regardless of weather or not we are considering local Operating System or Client and Server interactions, these models are usually only concerned with Subjects (files and folders), Objects (Applications and programs) and Users. Some incorporate procedures as well (transactions). Every computer regardless of operating system maintains a set of “Rings” with respect to system and application access and program execution. Windows 7, Linux and Unix clones all utilize these divisions with respect to applications running on x86 based hardware. These modes allow the system to differentiate between a program and a device driver and the kernel at the hardware layer. Thus if a device driver fails it would not take the kernel with i...