Operating Systems 600.418 Protection and Security

11/20/00


Click here to start


Table of Contents

Operating Systems 600.418 Protection and Security

Protection and Security

Protection

Domain of Protection

Domain Structure

Domain Implementation in Unix

Domain Implementation in Multics

Access Matrix

Access Matrix (cont.)

The Access Matrix is Dynamic

Implementations of Access Matix

Implementations of Access Matix (cont.)

Revocation of Access Rights

Security in Computer Systems

Attacks from Intruders

Security Threats in Computer Systems

Security Threats in Computer Systems

Authentication

Techniques for Obtaining Passwords

Password Selection Strategies

Password Selection Strategies

One Time Passwords

Intrusion Detection

Viruses and Other Threats

Trapdoor

Logic Bomb

Trojan Horse

Bacteria

Worm

The Internet Worm (1988)

Virus

Virus Stages

Types of Viruses

Types of Viruses

Antivirus Approaches

Antivirus Approaches

Taxonomy of Malicious Programs

Author: Yair Amir

Email: yairamir@cs.jhu.edu

Home Page: http://www.cs.jhu.edu/~yairamir/cs418/600-418.html

Other information:
Operating Systems (600.418), Lecture 9: Protection and Security