Hardware Architectures and Operating Systems Security
Everyone
- 15 videos | 1h 55m 21s
- Includes Assessment
Learn about system security, the study of security and vulnerabilities of individual computers.
WHAT YOU WILL LEARN
-
Understand why using hardware to enforce security is goodKnow about the history of multicsUnderstand how multics set the stage for important knowledge todayKnow what lessons were learned from multicsUnderstand the techniques attackers use to take over machinesUnderstand how enforced semantics helps in securityUnderstand how to protect information during information flowUnderstand what a capability machine is
-
Understand the basics of operating systems securityUnderstand complete mediationUnderstand the guard model and complete mediationUnderstand how to minimize the trusted computing baseKnow how difficult it is to get a bug-free tcbKnow how to find unstable codeTie up all of the knowledge learned in the systems security videos
IN THIS COURSE
-
5m 16sGain an understanding about why hardware is important in security. FREE ACCESS
-
4m 57sLearn about a hardware system of the past FREE ACCESS
-
7m 25sLearn how Multics has relevence today. FREE ACCESS
-
3m 50sFind out what lessons were learned from past systems FREE ACCESS
-
10m 33sLearn how attackers take over your machine. FREE ACCESS
-
12m 46sLearn how to enforce properties at the architectural level. FREE ACCESS
-
7m 2sLearn about how information flow relates to security. FREE ACCESS
-
9m 6sLearn about capability machines. FREE ACCESS
-
5m 29sLearn what operating systems security is. FREE ACCESS
-
11m 27sLearn about complete mediation. FREE ACCESS
-
9m 35sLearn about the guard model and complete mediation. FREE ACCESS
-
2m 43sLearn how to minimize the trusted computing base. FREE ACCESS
-
13m 20sLearn how difficult it is to get a bug-free TCB. FREE ACCESS
-
10m 11sLearn how to find unstable code. FREE ACCESS
-
1m 44sWrap up everything we have learned in operating systems security. FREE ACCESS