Operating Systems

  1. Protection and Security
    1. Protection Fundamentals
      1. Protection Goals
        1. Unauthorized Access Prevention
          1. Data Integrity Assurance
            1. System Availability Maintenance
              1. Resource Sharing Control
              2. Protection Principles
                1. Principle of Least Privilege
                  1. Separation of Privilege
                    1. Fail-Safe Defaults
                      1. Complete Mediation
                        1. Open Design
                        2. Protection Domains
                          1. Domain Definition
                            1. Domain Switching
                              1. User Domains
                                1. System Domains
                              2. Access Control Mechanisms
                                1. Access Matrix Model
                                  1. Matrix Structure
                                    1. Subject-Object Relationships
                                      1. Access Rights Specification
                                      2. Access Control Implementation
                                        1. Global Access Table
                                          1. Access Control Lists
                                            1. Capability Lists
                                              1. Implementation Comparison
                                              2. Access Control Models
                                                1. Discretionary Access Control
                                                  1. Mandatory Access Control
                                                    1. Role-Based Access Control
                                                      1. Attribute-Based Access Control
                                                    2. Security Threats and Attacks
                                                      1. Security Threat Categories
                                                        1. Confidentiality Threats
                                                          1. Integrity Threats
                                                            1. Availability Threats
                                                            2. Malicious Software
                                                              1. Computer Viruses
                                                                1. Virus Types
                                                                  1. Virus Propagation
                                                                    1. Virus Detection
                                                                    2. Computer Worms
                                                                      1. Worm Characteristics
                                                                        1. Network Propagation
                                                                          1. Worm Prevention
                                                                          2. Trojan Horses
                                                                            1. Trojan Functionality
                                                                              1. Trojan Distribution
                                                                                1. Trojan Detection
                                                                              2. System Attacks
                                                                                1. Buffer Overflow Attacks
                                                                                  1. Privilege Escalation
                                                                                    1. Denial of Service Attacks
                                                                                      1. Social Engineering
                                                                                      2. Network Security Threats
                                                                                        1. Network Sniffing
                                                                                          1. IP Spoofing
                                                                                            1. Man-in-the-Middle Attacks
                                                                                              1. Session Hijacking
                                                                                            2. Authentication Systems
                                                                                              1. Authentication Methods
                                                                                                1. Password-Based Authentication
                                                                                                  1. Password Policies
                                                                                                    1. Password Storage
                                                                                                      1. Password Attacks
                                                                                                      2. Token-Based Authentication
                                                                                                        1. Hardware Tokens
                                                                                                          1. Software Tokens
                                                                                                            1. Token Security
                                                                                                            2. Biometric Authentication
                                                                                                              1. Fingerprint Recognition
                                                                                                                1. Facial Recognition
                                                                                                                  1. Voice Recognition
                                                                                                                  2. Multi-Factor Authentication
                                                                                                                    1. Authentication Factors
                                                                                                                      1. Factor Combination
                                                                                                                        1. Implementation Strategies
                                                                                                                      2. Authentication Protocols
                                                                                                                        1. Challenge-Response Protocols
                                                                                                                          1. Kerberos Authentication
                                                                                                                            1. Public Key Authentication
                                                                                                                          2. Cryptographic Protection
                                                                                                                            1. Encryption Fundamentals
                                                                                                                              1. Symmetric Encryption
                                                                                                                                1. Asymmetric Encryption
                                                                                                                                  1. Hash Functions
                                                                                                                                  2. Key Management
                                                                                                                                    1. Key Generation
                                                                                                                                      1. Key Distribution
                                                                                                                                        1. Key Storage
                                                                                                                                          1. Key Revocation