Chapter 17 – |
Operating System Security |
William Stallings, Ph.D.
Chapter Contents:
|
17.1 |
|
Information Protection and Security
|
|
17.2 |
|
Requirements for Operating System Security
|
|
17.2.1 |
|
Requirements
|
|
17.2.2 |
|
Computer System Assets
|
|
17.2.2.1 |
|
Hardware
|
|
17.2.2.2 |
|
Software
|
|
17.2.2.3 |
|
Data
|
|
17.2.3 |
|
Design Principles
|
|
17.3 |
|
Protection Mechanisms
|
|
17.3.1. |
|
Protection of Memory
|
|
17.3.2 |
|
User-Oriented Access Control
|
|
17.3.3 |
|
Data-Oriented Access Control
|
|
17.3.4 |
|
Protection Based on an Operating System Mode
|
|
17.4 |
|
File Sharing
|
|
17.4.1 |
|
Access Rights
|
|
17.4.2 |
|
Simultaneous Access
|
|
17.5 |
|
Trusted Systems
|
|
17.5.1 |
|
Trojan Horse Defense
|
|
17.6 |
|
Windows 2000 Security
|
|
17.6.1 |
|
Access Control Scheme
|
|
17.6.2 |
|
Access Token
|
|
17.6.3 |
|
Security Descriptors
|
|
17.7 |
|
Notes
|
|
17.8 |
|
Further Reading
|
|
17.9 |
|
References
|
|
|
|