Due Wed Feb 6, 9am. No late assignments will be accepted.
Submit your solution using CMS. Prepare your solution as .doc, .docx, or .pdf, as follows:
In this assignment, you are asked to contemplate descriptions of hypothetical systems and identify the following.
As an example of what we would like you to produce, consider the following system description.
Threat model: The adversary desires to prevent baby deliveries. The adversary has access to radio equipment that transmits and receives on the same frequencies that providence uses for communication with a stork. The adversary also controls weapons systems that can destroy a stork in flight.
Here is the list of security properties, each identified with a type, that you might submit as an answer.
System 1: A Web-based Mail System. Users login by visiting a prespecified URL for the system and then entering both an identifier (i.e., a name) and a password. This starts a session that is associated with the specified identity. The system then displays in a preview frame a list of messages that have been sent to that identity and have not been deleted during this or some prior session associated with that identity. Here, for each message, the name of the sender and the contents of the message are displayed.
During a session, a user can:
Threat model: The adversary is a user who desires to read email, generate bogus email, and/or alter email that has been generated by bona fide users. The adversary has access to the URL for the mail system and also can read, delete, and/or update network packets in transit. The adversary cannot physically access or run programs on a user's machine that is running a browser to access the mail system. And the adversary cannot physically access or run programs on the mail system server.
System 2: A Grade Management System. This information system allows users to enter grades and access grades associated with assignments. A user is granted access to the system by providing a role (prof, ta, grader, or student) along with a Cornell netid and associated password. Permissible roles for each user are specified at the time a new course is added to the information system. Grades are assigned by graders. Regrades are done by teaching assistants when a student requests a regrade or when the TA notices a grade that seems anomalous. And a professor can perform any and/or all of these actions, but a professor's updates can only be changed by the professor. A student, in addition to learning about his or her grades on individual assignments, is entitled to learn the average and median grade for any given assignment.
Threat model: The adversary is a user who desires to learn grades, change grades, or prevent others from learning or changing grades. The adversary has access to the information system and also can read, delete, and/or update network messages in transit. The adversary cannot physically access or run programs on a user's machine that is running a browser to access the information system. And the adversary cannot physically access or run programs on the server hosting the information system.