Security
Last modified Wednesday, 30-Jun-2004 18:56:27 UTC.
(Slides)
- The problem (SG Ch.19.1, Slide 19.2)
- Password authentication (SG Ch.19.2-3, Slide 19.3)
- Program threats (SG Ch 19.4, Slide 19.4)
- System threats (SG Ch.19.5, Slide 19.5)
- Threat monitoring (SG Ch.19.6, Slide 19.6-7)
- Encryption (SG Ch.19.7, Slide 19.8-9)
Exam Style Questions
- Differentiate between "protection" and "security" in an operating system.
- Define a "secure" system.
- Prior to login, what parts of an operating system could be subject to
security violations?
- List three ways the user authentication by password can be attacked, and
how these can be countered by operating system features.
- Define a "Trojan horse" attack on system security. What common feature
of operating systems is often used to cause a Trojan horse to run?
- What operating system programs are used in internet worm attacks?
How can an operating system defend against internet worms?
- List six items of information an operating system might monitor for
potential security threats.
- Explain how the PGP encryption protocol works. Give an example of an
operating system feature that uses PGP protocol.