cse443-lecture-2-overview - Lecture 2 - Security Overview...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Lecture 2 - Security Overview CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page Readings • Books – Kaufman et al. – Jaeger – Both are listed on calendar • Readings – Please check the calendar for the class readings • Today, Kaufman, Chapter 1 Next, Kaufman, Chapter 9.1, Chapter 10 2 Series ISSN: XXXX-XXXX Morgan Claypool Publishers w w w . m o r g a n c l a y p o o l . c o m Series Editor: Ravi Sandhu, University of Texas at San Antonio Claypool C M S YNTHESIS L ECTURES ON I NFORMATION ECURITY , P RIVACY, AND T RUST About SYNTHESIs This volume is a printed version of a work that appears in the Synthesis Digital Library of Engineering and Computer Science. Synthesis Lectures provide concise, original presentations of important research and development topics, published quickly, in digital and print formats. For more information visit www.morganclaypool.com Series Editor ISBN: 978-1-59829-212-1 9 7 8 1 5 2 0 OPERATING SYSTEM SECURITY JAEGER Operating System Security Trent Jaeger, The Pennsylvania State University Operating systems provide the fundamental mechanisms for securing computer procesing. Since the 1960s, operating systems designers have explored how to build “secure” operating systems — operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream isue for al operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to satisfy these requirements, we see that the complexity of software systems often results in implementation chalenges that we are stil exploring to this day. However, if a system design does not aim for achieving the secure operating system requirements, then its security features fail to protect the system in a myriad of ways. We also study systems that have been retrofit with secure operating system features after an initial deployment. In al cases, the conflict between function on one hand and security on the other leads to dificult choices and the potential for unwise compromises. From this book, we hope that systems designers and implementers wil learn the requirements for operating systems that efectively enforce security and wil beter understand how to manage the balance between function and security. Operating System Security Trent Jaeger
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/11/2012 for the course CSE 443 taught by Professor Trentjaeger during the Spring '11 term at Pennsylvania State University, University Park.

Page1 / 21

cse443-lecture-2-overview - Lecture 2 - Security Overview...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online