0% found this document useful (0 votes)
141 views

Security Architecture and Design Study Plan

This document outlines a security architecture and design study plan covering topics such as system architecture, operating system components, security policy models, security modes of operation, evaluation methods, and threats. It discusses computer security, CPU and memory architecture, input/output management, virtual machines, information flow models, security requirements, assurance levels, and the differences between open and closed systems. The goal is to comprehensively review issues relevant to the security design of a system.

Uploaded by

Anonymous RA353C
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
141 views

Security Architecture and Design Study Plan

This document outlines a security architecture and design study plan covering topics such as system architecture, operating system components, security policy models, security modes of operation, evaluation methods, and threats. It discusses computer security, CPU and memory architecture, input/output management, virtual machines, information flow models, security requirements, assurance levels, and the differences between open and closed systems. The goal is to comprehensively review issues relevant to the security design of a system.

Uploaded by

Anonymous RA353C
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Security Architecture and Design Study Plan

Computer Security
System Architecture
Computer Architecture
The Central Processing Unit
Multiprocessing
Operating System Components
Memory Types
Virtual Memory
Input/Output Device Management
CPU Architecture
Operating System Architectures
Virtual Machines
System Security Architecture
Security Policy
Security Architecture Requirements
Security Models
State Machine Models
Bell-LaPadula Model
Biba Model
Clark-Wilson Model
Information Flow Model
Noninterference Model
Lattice Model
Brewer and Nash Model
Graham-Denning Model
Harrison-Ruzzo-Ullman Model
Security Modes of Operation
Dedicated Security Mode
System High-Security Mode
Compartmented Security Mode
Multilevel Security Mode
Trust and Assurance
Systems Evaluation Methods
Why Put a Product Through Evaluation?
The Orange Book
The Orange Book and the Rainbow Series
The Red Book
Information Technology Security
Evaluation Criteria
Common Criteria
Certification vs Accreditation
Certification
Accreditation
Open vs Closed Systems
Open Systems
Closed Systems
A Few Threats to Review
Maintenance Hooks

Time-of-Check/Time-of-Use Attacks

You might also like