CSEC3350 | OPERATING SYSTEM SECURITY

Attacker model (vulnerabilities and attack patterns), operating systems role and design in security, security principles, security models, authentication, access controls, privileges, physical access and secure deletion, memory protection, rings protection, virtualization, OS hardening including control flow restrictions, partitioning, information hiding, code and data integrity checks and anomaly detection.
(3 lectures)

Parent Business Unit ID: 
Prerequisite: 
COMP431 | OPERATING SYSTEMS