This lecture will address key security mechanisms and features of operating systems
Download here
Recommended reading
- Security in Computing, 6th edition, C. P. Pfleeger, S. L. Pfleeger: Chap. 5
Interesting links
- Operating System
- Protection ring
- Virtualization
- Process
- Introduction to Computer Security - Access Control and Authorization
- Access Control in Operating Systems
- Windows Access Control Model
- Windows Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)
- NTFS Security and Permissions
- Slightly Skeptical View on Unix Access Control Lists (ACLs)
- Unix Access Control Lists (ACL)
- Unix permissions model
- SUID and SGID attributes
- On the Security of UNIX (by Dennis Ritchie)
- Set-UID
- chroot
- AppArmor
- Linux namespaces
- Containerization
- Linux Containers (LXC)
- Linux Capabilities