Cybersecurity: Crash Course Computer Science #31

CrashCourse
11 Oct 201712:29

Summary

TLDR本视频是CrashCourse计算机科学系列的一部分,由Carrie Anne主讲。视频讨论了计算机互联互通带来的安全问题,并强调了网络安全的重要性。网络安全的目标是保护计算机系统和数据的保密性、完整性和可用性。视频介绍了威胁模型的概念,以及如何通过认证和访问控制来保护系统。讲解了三种主要的认证方法:知识认证、拥有认证和生物认证,以及它们的优缺点。此外,还介绍了访问控制列表(ACL)和Bell-LaPadula模型等概念。最后,视频强调了代码审计、隔离和沙箱技术在提高系统安全性方面的作用,并鼓励观众加强密码安全,开启双因素认证,并避免点击未经请求的电子邮件中的链接。

Takeaways

  • 🌐 网络安全是保护计算机系统和数据免受威胁的一系列技术,目标是保密性、完整性和可用性。
  • 🔒 保密性指只有授权的人才能访问特定计算机系统和数据,例如防止数据泄露。
  • 🛠️ 完整性意味着只有授权的人才能使用或修改系统和数据,如防止黑客冒充他人发送电子邮件。
  • 🚫 可用性指授权的人应始终能够访问他们的系统和数据,如防止拒绝服务攻击(DoS)。
  • 🎯 威胁模型是安全专家制定的,用于描述攻击者的能力、目标和可能的攻击手段。
  • 🔑 认证是确定用户身份的过程,分为三种类型:知识认证(如密码)、拥有认证(如密钥)、生物认证(如指纹)。
  • 🔐 使用强密码和多因素认证可以提高安全性,防止密码被猜测或窃取。
  • 📋 访问控制通过权限或访问控制列表(ACL)来指定用户对文件、文件夹和程序的访问权限。
  • 🏛 Bell-LaPadula模型是一种“不读上,不写下”的访问控制方法,用于保护不同级别的信息。
  • 🛡️ 安全内核或可信计算基础是操作系统中一小组接近可证明安全的软件。
  • 👀 独立验证和验证是一种通过安全意识开发者群体审计代码的过程,开源代码更易接受这种审计。
  • 🏗️ 隔离原则意味着即使程序被攻击者入侵,损害也应被限制和控制,不会影响计算机上其他程序的运行。

Q & A

  • 什么是网络安全的主要目的?

    -网络安全的主要目的是保护计算机系统和数据的保密性、完整性和可用性,以抵御威胁。

  • 如何定义保密性在网络安全中的含义?

    -在网络安全中,保密性或称为信息保密,意味着只有授权的人才能访问或读取特定的计算机系统和数据。

  • 完整性攻击的一个例子是什么?

    -完整性攻击的一个例子是黑客获取你的密码并发送伪装成你的电子邮件。

  • 什么是拒绝服务攻击(DoS Attack)?

    -拒绝服务攻击是一种攻击手段,黑客通过发送大量虚假请求来超载网站,使其变慢或对其他人无法访问,从而攻击服务的可用性。

  • 威胁模型在网络安全中扮演什么角色?

    -威胁模型是一种抽象层面上的“敌人”规范,它描述攻击者的能力、目标和可能的攻击手段,帮助安全专家准备对抗特定威胁。

  • 什么是“你知道的”认证方式?

    -“你知道的”认证方式基于只有真实用户和计算机知道的秘密知识,例如用户名和密码。

  • 暴力破解攻击是如何工作的?

    -暴力破解攻击是通过尝试所有可能的组合来猜测密码或PIN码,这是一种不涉及任何巧妙算法的直接尝试方法。

  • 为什么许多网站现在要求用户使用混合大小写字母、特殊符号等的密码组合?

    -使用混合大小写字母、特殊符号等的密码组合可以大大增加可能的密码组合数量,从而提高密码的安全性,使其更难被破解。

  • 什么是“你有的”认证方式?

    -“你有的”认证方式基于持有一个只有真实用户拥有的秘密令牌,例如物理钥匙和锁。

  • 生物识别认证有哪些优点和缺点?

    -生物识别认证(如指纹和虹膜扫描)可以非常安全,但成本较高,且数据随时间变化具有概率性,可能无法每次都准确识别或错误识别他人。此外,一旦生物识别数据被攻击者获取,将很难重置。

  • 什么是双因素或多因素认证?

    -双因素或多因素认证是一种安全措施,要求用户提供两种或以上的认证方式,比如密码和手机验证码,以增加安全性。

  • 访问控制列表(ACL)是如何工作的?

    -访问控制列表(ACL)通过指定每个用户对计算机上每个文件、文件夹和程序的访问权限来工作,包括读取、写入和执行权限。

  • 什么是Bell-LaPadula模型?

    -Bell-LaPadula模型是一种访问控制模型,它遵循“不读上,不写下”的原则,即用户不能读取高于其权限级别的文件,也不能向低于其权限级别的文件写入数据。

  • 如何减少安全漏洞的可能性?

    -减少安全漏洞的可能性可以通过减少实现错误、减少代码量、进行独立验证和确认、开源代码以供安全开发者审计、以及采取隔离原则如沙箱技术来实现。

Outlines

00:00

😀 网络安全简介

Carrie Anne在CrashCourse计算机科学课程中介绍了网络安全的重要性。她指出,就像现实世界中需要物理安全措施一样,虚拟世界中也需要网络安全来减少犯罪和伤害。计算机本身没有道德观念,它们会根据给定的问题快速输出答案,无论是好是坏。网络安全的目标是保护计算机系统和数据的保密性、完整性和可用性。为了实现这些目标,安全专家首先需要建立一个威胁模型,了解攻击者的能力、目标和可能的攻击手段。此外,还介绍了保护计算机系统和数据的多种方法,包括认证和访问控制,以及如何通过权限或访问控制列表(ACL)来管理用户对文件、文件夹和程序的访问权限。

05:00

🔐 认证与访问控制

本段深入探讨了认证的三种类型:知识认证(如用户名和密码)、拥有认证(如物理钥匙和锁)和生物认证(如指纹和虹膜扫描)。每种认证方式都有其优缺点,例如知识认证易受猜测攻击,拥有认证可能在物理接近时受到威胁,而生物认证则存在误识和不可重置的问题。为了提高安全性,专家建议使用双重或多重认证。接下来,讨论了访问控制,包括权限和访问控制列表(ACL),它们定义了用户对计算机上每个文件、文件夹和程序的访问权限。此外,还介绍了Bell-LaPadula模型,这是一种用于确保保密性、完整性和可用性的访问控制策略。

10:02

🛡️ 安全性实现与隔离

在这段视频中,讨论了如何减少实现错误,提高代码安全性。提出了“安全内核”或“可信计算基础”的概念,即操作系统软件的最小集合,接近于可证明的安全性。为了减少代码膨胀,建议减少实现的代码量。此外,还介绍了独立验证和验证过程,通过安全意识开发者群体对代码进行审计,这也是为什么安全代码几乎总是开源的原因。即使在减少代码和审计之后,攻击者仍可能找到入侵的方法。因此,开发者应该采取隔离原则,即使程序被攻破,损害也应被限制和控制。介绍了沙箱技术和虚拟机,它们可以隔离应用程序,即使一个程序出现问题,也不会影响到计算机上的其他程序或虚拟机。

Mindmap

Keywords

💡网络安全

网络安全指的是一系列技术和方法,用于保护计算机系统和数据免受未授权访问、破坏、泄露或其他形式的威胁。在视频中,网络安全被比喻为绝地武士团,目的是为网络世界带来和平与正义。它与视频主题紧密相关,因为整个视频都在讨论如何通过不同的技术和策略来保护我们的数字世界。

💡保密性

保密性,或称为数据的机密性,是指只有授权的个体才能访问或阅读特定的计算机系统和数据。视频中提到数据泄露,如黑客公开人们的信用卡信息,就是对保密性的攻击。保密性是网络安全的三个主要目标之一,强调了保护信息不被未授权访问的重要性。

💡完整性

完整性指的是只有授权的个体才有能力使用或修改系统和数据。例如,黑客通过获取你的密码并冒充你发送电子邮件,就是一种对完整性的攻击。在视频中,完整性是网络安全的另一个关键目标,它确保数据和系统的准确性和一致性,防止未授权的修改。

💡可用性

可用性意味着授权的个体应始终能够访问他们的系统和数据。视频通过拒绝服务攻击(DoS攻击)的例子来说明可用性的攻击,其中黑客通过发送大量的假请求来使网站变慢或对其他人不可访问。可用性是网络安全的第三个目标,确保系统和数据对于授权用户始终可用。

💡威胁模型

威胁模型是一个抽象级别的概念,用于描述谁是你的“敌人”,包括攻击者的能力和可能的攻击手段。视频中通过一个例子说明了如何根据威胁模型来保护你的笔记本电脑,根据威胁模型的不同,采取的安全措施也会不同。威胁模型是安全专家在设计安全系统时的起点,帮助他们准备对抗特定的威胁。

💡认证

认证是计算机了解它正在与之交互的是谁的过程。视频中提到了三种认证类型:知识认证(如用户名和密码)、拥有认证(如物理密钥和锁)和生物识别认证(如指纹和虹膜扫描)。认证是网络安全中的关键环节,它决定了谁可以访问系统,并且与视频的主题密切相关,因为它涉及到如何识别和区分正确的用户和错误的用户。

💡访问控制

访问控制是指一旦系统知道你是谁,它就需要知道你应该能够访问什么。这通常通过权限或访问控制列表(ACL)来实现,描述了每个用户对计算机上的每个文件、文件夹和程序的访问权限。访问控制是网络安全的重要组成部分,它确保了数据的保密性、完整性和可用性,通过限制不同用户对数据的访问权限来实现。

💡Bell-LaPadula模型

Bell-LaPadula模型是一种访问控制模型,用于确保安全性,特别是防止数据泄露。它遵循“不读上,不写下”的原则,即用户不应该能够读取高于其安全级别的信息,也不应该能够写入低于其安全级别的信息。这个模型在视频中被提及,作为确保组织内部不同访问权限级别用户数据安全的一个例子。

💡多因素认证

多因素认证是一种安全实践,要求用户提供两个或更多的身份验证因素,以证明其身份。视频提到,即使攻击者可能猜到你的密码或偷走你的手机,但同时做到这两点要困难得多。多因素认证增加了安全性,因为它不仅仅依赖于一个认证因素,如密码,这使得攻击者更难以非法进入系统。

💡沙箱

沙箱是一种安全机制,用于隔离程序的执行环境,以防止恶意软件影响系统的其他部分。在视频中,沙箱被比喻为将愤怒的孩子放在沙盒中,即使孩子在沙盒里大闹,也不会影响到沙盒外的其他孩子。沙箱技术通过为每个程序分配独立的内存块来实现隔离,即使一个程序出现问题,也不会影响到其他程序或整个系统。

💡独立验证和确认

独立验证和确认(IV&V)是一种通过一群有安全意识的开发者审计代码来验证软件安全性的过程。视频提到,安全代码几乎总是开源的,因为外部开发者可以用新的视角和不同的专业知识来发现问题。IV&V是减少软件中实现错误和提高代码安全性的重要手段,与视频的主题紧密相关,因为它涉及到如何确保我们使用的软件是安全的。

Highlights

网络安全的作用是保护计算机系统和数据免受威胁,其重要性与现实世界中的物理安全相当。

计算机本身没有道德观念,它们会根据给定的指令快速执行任务,不论是好是坏。

网络安全的目标是保护信息的保密性、完整性和可用性。

保密性(或称为机密性)意味着只有授权的人才能访问特定的计算机系统和数据。

完整性确保只有授权的人才能使用或修改系统和数据。

可用性指授权的人应始终能够访问他们的系统和数据。

安全专家通过构建威胁模型来准备对抗特定威胁。

威胁模型定义了攻击者的能力和可能的攻击手段,即攻击向量。

物理安全可以通过隐藏、锁定或其他方式来保护,取决于威胁模型。

认证是确定计算机与之交互对象身份的过程,通常有三种类型:知识、拥有和生物特征。

密码认证是最广泛使用的方法,但易受到猜测或泄露的风险。

使用更长、更复杂的密码可以增加安全性,但难以记忆。

拥有认证依赖于持有唯一的秘密令牌,如物理钥匙或智能卡。

生物特征认证基于个人特征,如指纹或虹膜扫描,虽然安全但存在误识风险。

为了提高安全性,建议使用双因素或多因素认证。

访问控制通过权限或访问控制列表(ACL)来规定用户对文件、文件夹和程序的访问权限。

Bell-LaPadula模型是一种确保信息保密性的访问控制策略,遵循“不读上,不写下”的原则。

安全内核或可信计算基础是操作系统中一小组接近可证明安全的软件。

独立验证和验证是一种通过安全意识开发者群体审计代码的过程。

隔离原则意味着即使程序被攻破,损害也应被限制和控制,不影响计算机上其他程序的运行。

Transcripts

play00:03

Hi, I’m Carrie Anne, and welcome to CrashCourse Computer Science!

play00:05

Over the last three episodes, we’ve talked about how computers have become interconnected,

play00:10

allowing us to communicate near-instantly across the globe.

play00:12

But, not everyone who uses these networks is going to play by the rules, or have our

play00:17

best interests at heart.

play00:18

Just as how we have physical security like locks, fences and police officers to minimize

play00:22

crime in the real world, we need cybersecurity to minimize crime and harm in the virtual

play00:27

world.

play00:27

Computers don’t have ethics.

play00:29

Give them a formally specified problem and they’ll happily pump out an answer at lightning

play00:33

speed.

play00:34

Running code that takes down a hospital’s computer systems until a ransom is paid is

play00:36

no different to a computer than code that keeps a patient's heart beating.

play00:40

Like the Force, computers can be pulled to the light side or the dark side.

play00:44

Cybersecurity is like the Jedi Order, trying to bring peace and justice to the cyber-verse.

play00:48

INTRO

play00:57

The scope of cybersecurity evolves as fast as the capabilities of computing, but we can

play01:02

think of it as a set of techniques to protect the secrecy, integrity and availability of

play01:06

computer systems and data against threats.

play01:09

Let’s unpack those three goals:

play01:11

Secrecy, or confidentiality, means that only authorized people should be able to access

play01:15

or read specific computer systems and data.

play01:18

Data breaches, where hackers reveal people’s credit card information, is an attack on secrecy.

play01:22

Integrity means that only authorized people should have the ability to use or modify systems

play01:27

and data.

play01:28

Hackers who learn your password and send e-mails masquerading as you, is an integrity attack.

play01:32

And availability means that authorized people should always have access to their systems

play01:36

and data.

play01:37

Think of Denial of Service Attacks, where hackers overload a website with fake requests

play01:42

to make it slow or unreachable for others.

play01:44

That’s attacking the service’s availability.

play01:46

To achieve these three general goals, security experts start with a specification of who

play01:50

your “enemy” is, at an abstract level, called a threat model.

play01:54

This profiles attackers: their capabilities, goals, and probable means of attack – what’s

play01:58

called, awesomely enough, an attack vector.

play02:01

Threat models let you prepare against specific threats, rather than being overwhelmed by

play02:04

all the ways hackers could get to your systems and data.

play02:07

And there are many, many ways.

play02:08

Let’s say you want to “secure” physical access to your laptop.

play02:12

Your threat model is a nosy roommate.

play02:14

To preserve the secrecy, integrity and availability of your laptop, you could keep it hidden in

play02:18

your dirty laundry hamper.

play02:20

But, if your threat model is a mischievous younger sibling who knows your hiding spots,

play02:24

then you’ll need to do more: maybe lock it in a safe.

play02:27

In other words, how a system is secured depends heavily on who it’s being secured against.

play02:31

Of course, threat models are typically a bit more formally defined than just “nosy roommate”.

play02:36

Often you’ll see threat models specified in terms of technical capabilities.

play02:40

For example, “someone who has physical access to your laptop along with unlimited time”.

play02:44

With a given threat model, security architects need to come up with a solution that keeps

play02:48

a system secure – as long as certain assumptions are met, like no one reveals their password

play02:52

to the attacker.

play02:53

There are many methods for protecting computer systems, networks and data.

play02:56

A lot of security boils down to two questions: who are you, and what should you have access to?

play03:02

Clearly, access should be given to the right people, but refused to the wrong people.

play03:06

Like, bank employees should be able to open ATMs to restock them, but not me… because

play03:10

I’d take it all... all of it!

play03:12

That ceramic cat collection doesn’t buy itself!

play03:14

So, to differentiate between right and wrong people, we use authentication - the process

play03:18

by which a computer understands who it’s interacting with.

play03:22

Generally, there are three types, each with their own pros and cons:

play03:25

What you know.

play03:26

What you have.

play03:26

And what you are.

play03:27

What you know authentication is based on knowledge of a secret that should be known only by the

play03:31

real user and the computer, for example, a username and password.

play03:35

This is the most widely used today because it’s the easiest to implement.

play03:38

But, it can be compromised if hackers guess or otherwise come to know your secret.

play03:42

Some passwords are easy for humans to figure out, like 12356 or q-w-e-r-t-y.

play03:48

But, there are also ones that are easy for computers.

play03:51

Consider the PIN: 2580.

play03:53

This seems pretty difficult to guess – and it is – for a human.

play03:56

But there are only ten thousand possible combinations of 4-digit PINs.

play04:00

A computer can try entering 0000, then try 0001, and then 0002, all the way up to 9999...

play04:08

in a fraction of a second.

play04:10

This is called a brute force attack, because it just tries everything.

play04:14

There’s nothing clever to the algorithm.

play04:16

Some computer systems lock you out, or have you wait a little, after say three wrong attempts.

play04:20

That’s a common and reasonable strategy, and it does make it harder for less sophisticated

play04:25

attackers.

play04:25

But think about what happens if hackers have already taken over tens of thousands of computers,

play04:29

forming a botnet.

play04:30

Using all these computers, the same pin – 2580 – can be tried on many tens of thousands

play04:35

of bank accounts simultaneously.

play04:37

Even with just a single attempt per account, they’ll very likely get into one or more

play04:41

that just happen to use that PIN.

play04:43

In fact, we’ve probably guessed the pin of someone watching this video!

play04:46

Increasing the length of PINs and passwords can help, but even 8 digit PINs are pretty

play04:50

easily cracked.

play04:51

This is why so many websites now require you to use a mix of upper and lowercase letters,

play04:55

special symbols, and so on – it explodes the number of possible password combinations.

play05:00

An 8-digit numerical PIN only has a hundred million combinations – computers eat that

play05:04

for breakfast!

play05:05

But an 8-character password with all those funky things mixed in has more than 600 trillion

play05:10

combinations.

play05:11

Of course, these passwords are hard for us mere humans to remember, so a better approach

play05:15

is for websites to let us pick something more memorable, like three words joined together:

play05:19

“green brothers rock” or “pizza tasty yum”.

play05:22

English has around 100,000 words in use, so putting three together would give you roughly

play05:27

1 quadrillion possible passwords. Good luck trying to guess that!

play05:31

I should also note here that using non-dictionary words is even better against more sophisticated

play05:35

kinds of attacks, but we don’t have time to get into that here.

play05:38

Computerphile has a great video on choosing a password - link in the dooblydoo.

play05:42

What you have authentication, on the other hand, is based on possession of a secret token

play05:45

that only the real user has.

play05:47

An example is a physical key and lock.

play05:49

You can only unlock the door if you have the key.

play05:52

This escapes this problem of being “guessable”.

play05:54

And they typically require physical presence, so it’s much harder for remote attackers

play05:58

to gain access.

play05:59

Someone in another country can’t gain access to your front door in Florida without getting

play06:02

to Florida first.

play06:03

But, what you have authentication can be compromised if an attacker is physically close.

play06:08

Keys can be copied, smartphones stolen, and locks picked.

play06:11

Finally, what you are authentication is based on... you!

play06:14

You authenticate by presenting yourself to the computer.

play06:17

Biometric authenticators, like fingerprint readers and iris scanners are classic examples.

play06:22

These can be very secure, but the best technologies are still quite expensive.

play06:26

Furthermore, data from sensors varies over time.

play06:29

What you know and what you have authentication have the nice property of being deterministic

play06:33

– either correct or incorrect.

play06:35

If you know the secret, or have the key, you’re granted access 100% of the time.

play06:40

If you don’t, you get access zero percent of the time.

play06:42

Biometric authentication, however, is probabilistic.There’s some chance the system won’t recognize you…

play06:48

maybe you’re wearing a hat or the lighting is bad.

play06:50

Worse, there’s some chance the system will recognize the wrong person as you – like

play06:54

your evil twin!

play06:55

Of course, in production systems, these chances are low, but not zero.

play06:59

Another issue with biometric authentication is it can’t be reset.

play07:02

You only have so many fingers, so what happens if an attacker compromises your fingerprint data?

play07:07

This could be a big problem for life.

play07:09

And, recently, researchers showed it’s possible to forge your iris just by capturing a photo

play07:13

of you, so that’s not promising either.

play07:15

Basically, all forms of authentication have strengths and weaknesses, and all can be compromised

play07:20

in one way or another.

play07:21

So, security experts suggest using two or more forms of authentication for important

play07:26

accounts.

play07:27

This is known as two-factor or multi-factor authentication.

play07:29

An attacker may be able to guess your password or steal your phone: but it’s much harder

play07:33

to do both.

play07:34

After authentication comes Access Control.

play07:36

Once a system knows who you are, it needs to know what you should be able to access,

play07:40

and for that there’s a specification of who should be able to see, modify and use what.

play07:45

This is done through Permissions or Access Control Lists (ACL), which describe what access

play07:49

each user has for every file, folder and program on a computer.

play07:52

“Read” permission allows a user to see the contents of a file, “write” permission

play07:57

allows a user to modify the contents, and “execute” permission allows a user to

play08:00

run a file, like a program.

play08:02

For organizations with users at different levels of access privilege – like a spy

play08:05

agency – it’s especially important for Access Control Lists to be configured correctly

play08:10

to ensure secrecy, integrity and availability.

play08:13

Let’s say we have three levels of access: public, secret and top secret.

play08:17

The first general rule of thumb is that people shouldn’t be able to “read up”.

play08:20

If a user is only cleared to read secret files, they shouldn’t be able to read top secret

play08:24

files, but should be able to access secret and public ones.

play08:28

The second general rule of thumb is that people shouldn’t be able to “write down”.

play08:31

If a member has top secret clearance, then they should be able to write or modify top

play08:35

secret files, but not secret or public files.

play08:38

It may seem weird that even with the highest clearance, you can’t modify less secret files.

play08:42

But, it guarantees that there’s no accidental leakage of top secret information into secret

play08:47

or public files.

play08:48

This “no read up, no write down” approach is called the Bell-LaPadula model.

play08:52

It was formulated for the U.S. Department of Defense’s Multi-Level Security policy.

play08:57

There are many other models for access control – like the Chinese Wall model and Biba model.

play09:01

Which model is best depends on your use-case.

play09:03

Authentication and access control help a computer determine who you are and what you should

play09:08

access, but depend on being able to trust the hardware and software that run the authentication

play09:12

and access control programs.

play09:14

That’s a big dependence.

play09:15

If an attacker installs malicious software – called malware – compromising the host

play09:20

computer’s operating system, how can we be sure security programs don’t have a backdoor

play09:24

that let attackers in?

play09:25

The short answer is… we can’t.

play09:27

We still have no way to guarantee the security of a program or computing system.

play09:31

That’s because even while security software might be “secure” in theory, implementation

play09:35

bugs can still result in vulnerabilities.

play09:37

But, we do have techniques to reduce the likelihood of bugs, quickly find and patch bugs when

play09:42

they do occur, and mitigate damage when a program is compromised.

play09:46

Most security errors come from implementation error.

play09:49

To reduce implementation error, reduce implementation.

play09:52

One of the holy grails of system level security is a “security kernel” or a “trusted

play09:57

computing base”: a minimal set of operating system software that’s close to provably secure.

play10:02

A challenge in constructing these security kernels is deciding what should go into it.

play10:06

Remember, the less code, the better!

play10:08

Even after minimizing code bloat, it would be great to “guarantee” that code as written

play10:12

is secure.

play10:13

Formally verifying the security of code is an active area of research.

play10:17

The best we have right now is a process called Independent Verification and Validation.

play10:22

This works by having code audited by a crowd of security-minded developers.

play10:26

This is why security code is almost always open-sourced.

play10:28

It’s often difficult for people who wrote the original code to find bugs, but external

play10:32

developers, with fresh eyes and different expertise, can spot problems.

play10:36

There are also conferences where like-minded hackers and security experts can mingle and

play10:40

share ideas, the biggest of which is DEF CON, held annually in Las Vegas.

play10:44

Finally, even after reducing code and auditing it, clever attackers are bound to find tricks

play10:48

that let them in.

play10:49

With this in mind, good developers should take the approach that, not if, but when their

play10:53

programs are compromised, the damage should be limited and contained, and not let it compromise

play10:57

other things running on the computer.

play11:00

This principle is called isolation.

play11:01

To achieve isolation, we can “sandbox” applications.

play11:04

This is like placing an angry kid in a sandbox; when the kid goes ballistic, they only destroy

play11:09

the sandcastle in their own box, but other kids in the playground continue having fun.

play11:14

Operating Systems attempt to sandbox applications by giving each their own block of memory that

play11:19

others programs can’t touch.

play11:20

It’s also possible for a single computer to run multiple Virtual Machines, essentially

play11:24

simulated computers, that each live in their own sandbox.

play11:27

If a program goes awry, worst case is that it crashes or compromises only the virtual

play11:31

machine on which it’s running.

play11:33

All other Virtual Machines running on the computer are isolated and unaffected.

play11:37

Ok, that’s a broad overview of some key computer security topics.

play11:41

And I didn’t even get to network security, like firewalls.

play11:43

Next episode, we’ll discuss some specific example methods hackers use to get into computer

play11:46

systems.

play11:47

After that, we’ll touch on encryption.

play11:49

Until then, make your passwords stronger, turn on 2-factor authentication, and NEVER

play11:53

click links in unsolicited emails!

play11:56

I’ll see you next week.

Rate This

5.0 / 5 (0 votes)

Related Tags
网络安全保密性完整性可用性多层次认证访问控制威胁模型密码安全生物识别系统隔离安全策略
Do you need a summary in English?