tailieunhanh - Lecture Operating systems: Internals and design principles (6/E): Chapter 14 - William Stallings

Chapter 14 - Computer security threats. After studying this chapter, you should be able to: Describe the various approaches to virtualization, understand the processor issues involved in implementing a virtual machine, understand the memory management issues involved in implementing a virtual machine, understand the I/O management issues involved in implementing a virtual machine,. | Chapter 14 Computer Security Threats Dave Bremer Otago Polytechnic, . ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings These slides are intended to help a teacher develop a presentation. This PowerPoint covers the entire chapter and includes too many slides for a single delivery. Professors are encouraged to adapt this presentation in ways which are best suited for their students and environment. 1 Roadmap Computer Security Concepts Threats, Attacks, and Assets Intruders Malicious Software Overview Viruses, Worms, and Bots Rootkits Chapter 14 begins with an overview of computer security concept. Then the chapter provides a survey of the threats to computer security. he bulk of the chapter is devoted to four major threats: viruses, worms, bots, and rootkits. 2 Security definition The NIST Computer Security Handbook defines computer security as: The protection afforded to an automated information system in order to attain the applicable . | Chapter 14 Computer Security Threats Dave Bremer Otago Polytechnic, . ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings These slides are intended to help a teacher develop a presentation. This PowerPoint covers the entire chapter and includes too many slides for a single delivery. Professors are encouraged to adapt this presentation in ways which are best suited for their students and environment. 1 Roadmap Computer Security Concepts Threats, Attacks, and Assets Intruders Malicious Software Overview Viruses, Worms, and Bots Rootkits Chapter 14 begins with an overview of computer security concept. Then the chapter provides a survey of the threats to computer security. he bulk of the chapter is devoted to four major threats: viruses, worms, bots, and rootkits. 2 Security definition The NIST Computer Security Handbook defines computer security as: The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources Computer Security Triad Three key objectives are at the heart of computer security Confidentiality Integrity Availability Confidentiality: Covering two related concepts: — Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals —Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed Integrity: Also covers two related concepts: —Data integrity: Assures that information and programs are changed only in a specified and authorized manner —System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system Availability: Assures that systems work promptly and service is not denied to authorized

TỪ KHÓA LIÊN QUAN