SlideShare une entreprise Scribd logo
1  sur  56
Security Chapter  6.1 9.1 The security environment  9.2 Basics of cryptography  9.3 User authentication  9.4 Attacks from inside the system  9.5 Attacks from outside the system  9.6 Protection mechanisms  9.7 Trusted systems
The Security Environment Threats ,[object Object]
Intruders ,[object Object],[object Object],[object Object],[object Object],[object Object]
Accidental Data Loss ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basics of Cryptography ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Secret-Key Cryptography
Public-Key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object]
One-Way Functions ,[object Object],[object Object],[object Object],[object Object]
Digital Signatures ,[object Object],[object Object],(b)
User Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication Using Passwords ,[object Object],[object Object],[object Object]
Authentication Using Passwords ,[object Object],[object Object]
Authentication Using Passwords ,[object Object],[object Object],Salt Password , , , ,
Authentication Using a Physical Object ,[object Object],[object Object],[object Object]
Authentication Using Biometrics ,[object Object]
Countermeasures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operating System Security Trojan Horses ,[object Object],[object Object],[object Object],[object Object]
Login Spoofing ,[object Object],[object Object]
Logic Bombs ,[object Object],[object Object],[object Object],[object Object]
Trap Doors ,[object Object],[object Object]
Buffer Overflow ,[object Object],[object Object],[object Object]
Generic Security Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Famous Security Flaws ,[object Object],(a) (b) (c)
Design Principles for Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],And …  keep it simple
Network Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virus Damage Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Viruses Work (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Viruses Work (2) ,[object Object],[object Object],[object Object]
How Viruses Work (3) ,[object Object],[object Object],[object Object],[object Object]
How Viruses Work (4) ,[object Object],[object Object],[object Object]
How Viruses Spread ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Antivirus and Anti-Antivirus Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object]
Antivirus and Anti-Antivirus Techniques ,[object Object],[object Object]
Antivirus and Anti-Antivirus Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet Worm ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Code (1) Sandboxing ,[object Object],[object Object]
Mobile Code (2) ,[object Object]
Mobile Code (3) ,[object Object]
Java Security (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Java Security (2) ,[object Object]
Protection Mechanisms   Protection Domains (1) ,[object Object]
Protection Domains (2) ,[object Object]
Protection Domains (3) ,[object Object]
Access Control Lists (1) ,[object Object]
Access Control Lists (2) ,[object Object]
Capabilities (1) ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Capabilities (2) f(Objects, Rights, Check) Rights Object Server
Trusted Systems Trusted Computing Base ,[object Object]
Formal Models of Secure Systems ,[object Object],[object Object]
Multilevel Security (1) ,[object Object]
Multilevel Security (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Orange Book Security (1) ,[object Object],[object Object]
Orange Book Security (2)
Covert Channels (1) Client, server and collaborator processes Encapsulated server can still leak to collaborator via covert channels
Covert Channels (2) ,[object Object]
Covert Channels (3) ,[object Object],[object Object],[object Object],Zebras Hamlet, Macbeth, Julius Caesar Merchant of Venice, King Lear

Contenu connexe

Tendances

Program security
Program securityProgram security
Program securityG Prachi
 
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric VanderburgEric Vanderburg
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshortVincent Ohprecio
 
The Future of Automated Malware Generation
The Future of Automated Malware GenerationThe Future of Automated Malware Generation
The Future of Automated Malware GenerationStephan Chenette
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacksUltraUploader
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzingG Prachi
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01G Prachi
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux SecurityGeo Marian
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Virus detection system
Virus detection systemVirus detection system
Virus detection systemAkshay Surve
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajaliwebhostingguy
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition Fraunhofer AISEC
 

Tendances (20)

Program security
Program securityProgram security
Program security
 
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Ch14 security
Ch14   securityCh14   security
Ch14 security
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshort
 
The Future of Automated Malware Generation
The Future of Automated Malware GenerationThe Future of Automated Malware Generation
The Future of Automated Malware Generation
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacks
 
Windows network
Windows networkWindows network
Windows network
 
Automating malware analysis
Automating malware analysis Automating malware analysis
Automating malware analysis
 
Web backdoors attacks, evasion, detection
Web backdoors   attacks, evasion, detectionWeb backdoors   attacks, evasion, detection
Web backdoors attacks, evasion, detection
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzing
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
 
Skywiper
SkywiperSkywiper
Skywiper
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition
 

En vedette

Twitter - Comunicare e Raccontarsi nel Web Social
Twitter - Comunicare e Raccontarsi nel Web SocialTwitter - Comunicare e Raccontarsi nel Web Social
Twitter - Comunicare e Raccontarsi nel Web SocialNetlife s.r.l.
 
Presentazione Netlife s.r.l.
Presentazione Netlife s.r.l.Presentazione Netlife s.r.l.
Presentazione Netlife s.r.l.Netlife s.r.l.
 
Comunicare nel web 2.0
Comunicare nel web 2.0Comunicare nel web 2.0
Comunicare nel web 2.0Netlife s.r.l.
 
Wikipedia in outreach
Wikipedia in outreachWikipedia in outreach
Wikipedia in outreachmblso
 
Op Sy 03 Ch 00
Op Sy 03 Ch 00Op Sy 03 Ch 00
Op Sy 03 Ch 00 Google
 
Future Uses Of Computers Powerpoint
Future  Uses Of  Computers  PowerpointFuture  Uses Of  Computers  Powerpoint
Future Uses Of Computers Powerpointryan022395
 
Op Sy 03 Ch 25
Op Sy 03 Ch 25Op Sy 03 Ch 25
Op Sy 03 Ch 25 Google
 
p-Health_2007
p-Health_2007p-Health_2007
p-Health_2007ITACA-TSB
 
Intro-to-scrum
Intro-to-scrumIntro-to-scrum
Intro-to-scrumEslam Diaa
 
Latinisms A Inoa
Latinisms A InoaLatinisms A Inoa
Latinisms A Inoaconfuncio
 
Latinisms Alfonso
Latinisms AlfonsoLatinisms Alfonso
Latinisms Alfonsoconfuncio
 
Chapter 11
Chapter 11Chapter 11
Chapter 11 Google
 
Brazen Careerist
Brazen CareeristBrazen Careerist
Brazen Careeristbkeenhold
 

En vedette (20)

Twitter - Comunicare e Raccontarsi nel Web Social
Twitter - Comunicare e Raccontarsi nel Web SocialTwitter - Comunicare e Raccontarsi nel Web Social
Twitter - Comunicare e Raccontarsi nel Web Social
 
Presentazione Netlife s.r.l.
Presentazione Netlife s.r.l.Presentazione Netlife s.r.l.
Presentazione Netlife s.r.l.
 
Social Silver Surfer
Social Silver SurferSocial Silver Surfer
Social Silver Surfer
 
Comunicare nel web 2.0
Comunicare nel web 2.0Comunicare nel web 2.0
Comunicare nel web 2.0
 
Wikipedia in outreach
Wikipedia in outreachWikipedia in outreach
Wikipedia in outreach
 
Op Sy 03 Ch 00
Op Sy 03 Ch 00Op Sy 03 Ch 00
Op Sy 03 Ch 00
 
Future Uses Of Computers Powerpoint
Future  Uses Of  Computers  PowerpointFuture  Uses Of  Computers  Powerpoint
Future Uses Of Computers Powerpoint
 
Night Settings
Night SettingsNight Settings
Night Settings
 
Op Sy 03 Ch 25
Op Sy 03 Ch 25Op Sy 03 Ch 25
Op Sy 03 Ch 25
 
p-Health_2007
p-Health_2007p-Health_2007
p-Health_2007
 
Intro-to-scrum
Intro-to-scrumIntro-to-scrum
Intro-to-scrum
 
Computers
ComputersComputers
Computers
 
School Uniforms
School UniformsSchool Uniforms
School Uniforms
 
Latinisms A Inoa
Latinisms A InoaLatinisms A Inoa
Latinisms A Inoa
 
Latinisms Alfonso
Latinisms AlfonsoLatinisms Alfonso
Latinisms Alfonso
 
Full Page Photo
Full Page PhotoFull Page Photo
Full Page Photo
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
School Uniforms
School UniformsSchool Uniforms
School Uniforms
 
Be social
Be socialBe social
Be social
 
Brazen Careerist
Brazen CareeristBrazen Careerist
Brazen Careerist
 

Similaire à Op Sy 03 Ch 61

Ch19 OS
Ch19 OSCh19 OS
Ch19 OSC.U
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethicsArgie242424
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure ! trendy updates
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)Wail Hassan
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersSomyos U.
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 

Similaire à Op Sy 03 Ch 61 (20)

OSCh19
OSCh19OSCh19
OSCh19
 
OS_Ch19
OS_Ch19OS_Ch19
OS_Ch19
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
 
Communication security
Communication securityCommunication security
Communication security
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Cloud Computing & Security
Cloud Computing & SecurityCloud Computing & Security
Cloud Computing & Security
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure !
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Attacking antivirus
Attacking antivirusAttacking antivirus
Attacking antivirus
 
Malware
MalwareMalware
Malware
 
Data security
Data securityData security
Data security
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Ch19
Ch19Ch19
Ch19
 

Plus de Google

Op Sy 03 Ch 101
Op Sy 03 Ch 101Op Sy 03 Ch 101
Op Sy 03 Ch 101 Google
 
Chapter 06
Chapter 06Chapter 06
Chapter 06 Google
 
Chapter 07
Chapter 07Chapter 07
Chapter 07 Google
 
Chapter 08
Chapter 08Chapter 08
Chapter 08 Google
 
Chapter 10
Chapter 10Chapter 10
Chapter 10 Google
 
Chapter 12
Chapter 12Chapter 12
Chapter 12 Google
 
Op Sy 03 Ch 01
Op Sy 03 Ch 01Op Sy 03 Ch 01
Op Sy 03 Ch 01 Google
 
Op Sy 03 Ch 21
Op Sy 03 Ch 21Op Sy 03 Ch 21
Op Sy 03 Ch 21 Google
 
Op Sy 03 Ch 22
Op Sy 03 Ch 22Op Sy 03 Ch 22
Op Sy 03 Ch 22 Google
 
Op Sy 03 Ch 23
Op Sy 03 Ch 23Op Sy 03 Ch 23
Op Sy 03 Ch 23 Google
 
Op Sy 03 Ch 24
Op Sy 03 Ch 24Op Sy 03 Ch 24
Op Sy 03 Ch 24 Google
 
Op Sy 03 Ch 31
Op Sy 03 Ch 31Op Sy 03 Ch 31
Op Sy 03 Ch 31 Google
 
Op Sy 03 Ch 32
Op Sy 03 Ch 32Op Sy 03 Ch 32
Op Sy 03 Ch 32 Google
 
Op Sy 03 Ch 33
Op Sy 03 Ch 33Op Sy 03 Ch 33
Op Sy 03 Ch 33 Google
 
Op Sy 03 Ch 41
Op Sy 03 Ch 41Op Sy 03 Ch 41
Op Sy 03 Ch 41 Google
 
Op Sy 03 Ch 51
Op Sy 03 Ch 51Op Sy 03 Ch 51
Op Sy 03 Ch 51 Google
 
Op Sy 03 Ch 71
Op Sy 03 Ch 71Op Sy 03 Ch 71
Op Sy 03 Ch 71 Google
 
Chapter 05
Chapter 05Chapter 05
Chapter 05 Google
 
Chapter 04
Chapter 04Chapter 04
Chapter 04 Google
 
Chapter 03
Chapter 03Chapter 03
Chapter 03 Google
 

Plus de Google (20)

Op Sy 03 Ch 101
Op Sy 03 Ch 101Op Sy 03 Ch 101
Op Sy 03 Ch 101
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Op Sy 03 Ch 01
Op Sy 03 Ch 01Op Sy 03 Ch 01
Op Sy 03 Ch 01
 
Op Sy 03 Ch 21
Op Sy 03 Ch 21Op Sy 03 Ch 21
Op Sy 03 Ch 21
 
Op Sy 03 Ch 22
Op Sy 03 Ch 22Op Sy 03 Ch 22
Op Sy 03 Ch 22
 
Op Sy 03 Ch 23
Op Sy 03 Ch 23Op Sy 03 Ch 23
Op Sy 03 Ch 23
 
Op Sy 03 Ch 24
Op Sy 03 Ch 24Op Sy 03 Ch 24
Op Sy 03 Ch 24
 
Op Sy 03 Ch 31
Op Sy 03 Ch 31Op Sy 03 Ch 31
Op Sy 03 Ch 31
 
Op Sy 03 Ch 32
Op Sy 03 Ch 32Op Sy 03 Ch 32
Op Sy 03 Ch 32
 
Op Sy 03 Ch 33
Op Sy 03 Ch 33Op Sy 03 Ch 33
Op Sy 03 Ch 33
 
Op Sy 03 Ch 41
Op Sy 03 Ch 41Op Sy 03 Ch 41
Op Sy 03 Ch 41
 
Op Sy 03 Ch 51
Op Sy 03 Ch 51Op Sy 03 Ch 51
Op Sy 03 Ch 51
 
Op Sy 03 Ch 71
Op Sy 03 Ch 71Op Sy 03 Ch 71
Op Sy 03 Ch 71
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 

Dernier

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 

Dernier (20)

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Op Sy 03 Ch 61

  • 1. Security Chapter 6.1 9.1 The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from outside the system 9.6 Protection mechanisms 9.7 Trusted systems
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 54. Covert Channels (1) Client, server and collaborator processes Encapsulated server can still leak to collaborator via covert channels
  • 55.
  • 56.