Overview of Operating System Security
Date on which it was created: Created: October 27,
2003
Date on which it was last-updated:Last Updated: October 27,
2003
Sub Module version number: Version 0.1
Author of the sub module: Dr. Ping Chen
Code: OSS1
Objectives
This submodule provides an overview of operating system
security.
Prerequisite
Operating
System
Description
Four aspects of a trusted OS; Pros and cons; Information and
role Compartmentalization; Mandatory Access Control; Sensitivity Labels; Trusted
OS Implementations; Common Criteria Assurance Levels
Lecture Notes
Notes
1
Assignments
Assignment
1
Assignment
2
Assignment
3
Resources
Books
Articles
Links
Glossary
Trusted process: a process that has privileges to circumvent the
system security policy and has been tested and verified to operate only as
intended
Trusted Software: the software portion of a system that can be relied
upon to enforce security policy
Trusted System: a system that employs sufficient hardware and software
integrity measures to allow its use for processing sensitive
information