Overview of Operating System Security

Date on which it was created: Created: October 27, 2003
Date on which it was last-updated:Last Updated: October 27, 2003

Sub Module version number: Version 0.1
Author of the sub module: Dr. Ping Chen


Code: OSS1


Objectives

This submodule provides an overview of operating system security.

Prerequisite

Operating System

Description

Four aspects of a trusted OS; Pros and cons; Information and role Compartmentalization; Mandatory Access Control; Sensitivity Labels; Trusted OS Implementations; Common Criteria Assurance Levels


Lecture Notes

Notes 1

Assignments

Assignment 1
Assignment 2
Assignment 3


Resources

Books
Articles
Links


Glossary

Trusted process: a process that has privileges to circumvent the system security policy and has been tested and verified to operate only as intended

Trusted Software: the software portion of a system that can be relied upon to enforce security policy

Trusted System: a system that employs sufficient hardware and software integrity measures to allow its use for processing sensitive information