Useful Links
Computer Science
Operating Systems
Operating Systems
1. Introduction to Operating Systems
2. Operating System Structures
3. Process Management
4. CPU Scheduling
5. Process Synchronization
6. Memory Management
7. Storage Management
8. I/O Systems
9. Protection and Security
10. Advanced Topics
Protection and Security
Protection Fundamentals
Protection Goals
Unauthorized Access Prevention
Data Integrity Assurance
System Availability Maintenance
Resource Sharing Control
Protection Principles
Principle of Least Privilege
Separation of Privilege
Fail-Safe Defaults
Complete Mediation
Open Design
Protection Domains
Domain Definition
Domain Switching
User Domains
System Domains
Access Control Mechanisms
Access Matrix Model
Matrix Structure
Subject-Object Relationships
Access Rights Specification
Access Control Implementation
Global Access Table
Access Control Lists
Capability Lists
Implementation Comparison
Access Control Models
Discretionary Access Control
Mandatory Access Control
Role-Based Access Control
Attribute-Based Access Control
Security Threats and Attacks
Security Threat Categories
Confidentiality Threats
Integrity Threats
Availability Threats
Malicious Software
Computer Viruses
Virus Types
Virus Propagation
Virus Detection
Computer Worms
Worm Characteristics
Network Propagation
Worm Prevention
Trojan Horses
Trojan Functionality
Trojan Distribution
Trojan Detection
System Attacks
Buffer Overflow Attacks
Privilege Escalation
Denial of Service Attacks
Social Engineering
Network Security Threats
Network Sniffing
IP Spoofing
Man-in-the-Middle Attacks
Session Hijacking
Authentication Systems
Authentication Methods
Password-Based Authentication
Password Policies
Password Storage
Password Attacks
Token-Based Authentication
Hardware Tokens
Software Tokens
Token Security
Biometric Authentication
Fingerprint Recognition
Facial Recognition
Voice Recognition
Multi-Factor Authentication
Authentication Factors
Factor Combination
Implementation Strategies
Authentication Protocols
Challenge-Response Protocols
Kerberos Authentication
Public Key Authentication
Cryptographic Protection
Encryption Fundamentals
Symmetric Encryption
Asymmetric Encryption
Hash Functions
Key Management
Key Generation
Key Distribution
Key Storage
Key Revocation
Previous
8. I/O Systems
Go to top
Next
10. Advanced Topics