Changes between Version 37 and Version 38 of Security


Ignore:
Timestamp:
05/01/2008 12:59:34 PM (11 years ago)
Author:
bbaker
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • Security

    v37 v38  
    6464[Needed: list of other organizations whose facilities we will share] 
    6565 
     66== Threats == 
     67 
     68What threats does LSST need to guard against? 
     69 
     70[To be filled in & organized -- this is really just a placeholder] 
     71 * Data deletion, both accidental & malicious 
     72 * DOS, both accidental & malicious 
     73 * Loss of connectivity (is this a security issue, an operations issue, or both?) 
     74   * Between mountaintop & base station 
     75   * Between base station & archive center 
     76 
     77Are these threats too abstract?  Should we focus on things like "cable cut" instead of "loss of connectivity"?  Both the cause & the symptom are important. 
     78 
    6679== Questions == 
    6780 
    6881How does security policy relate to: 
    6982 
    70  * Disaster preparedness? 
     83 * Disaster preparedness?  For example, cable cuts on the mountain? 
    7184 * Application performance?  In particular, denial-of-service that exploits expensive computations? 
    7285 * Measuring and ensuring data integrity?