threat model
a formal model of the actions that an attacker can & cannot perform (aka a trusted computing base or components that an attacker can & cannot perform)
what are 4 that an attacker must follow? (aka model)
what does an un-sanitized input?
a system doesn’t validate input before using it (therefore we should always check user input before using it)
what are side channels?
information is leaked in indirect ways -> for instance different timing could allow for a password to be guessed if it awas 1 ms for a correct and 2 ms for an incorrect value)
what is security through obscurity?
the attacker does not know what program we are executing
what does an attacker observe/control in a single node system?
what does an attacker observer in a multi node system?
observe messages sent between nodes
drop messages sent between nodes
change messages sent between nodes