Security Architecture and Design Study Plan
Security Architecture and Design Study Plan
Computer Security
System Architecture
Computer Architecture
The Central Processing Unit
Multiprocessing
Operating System Components
Memory Types
Virtual Memory
Input/Output Device Management
CPU Architecture
Operating System Architectures
Virtual Machines
System Security Architecture
Security Policy
Security Architecture Requirements
Security Models
State Machine Models
Bell-LaPadula Model
Biba Model
Clark-Wilson Model
Information Flow Model
Noninterference Model
Lattice Model
Brewer and Nash Model
Graham-Denning Model
Harrison-Ruzzo-Ullman Model
Security Modes of Operation
Dedicated Security Mode
System High-Security Mode
Compartmented Security Mode
Multilevel Security Mode
Trust and Assurance
Systems Evaluation Methods
Why Put a Product Through Evaluation?
The Orange Book
The Orange Book and the Rainbow Series
The Red Book
Information Technology Security
Evaluation Criteria
Common Criteria
Certification vs Accreditation
Certification
Accreditation
Open vs Closed Systems
Open Systems
Closed Systems
A Few Threats to Review
Maintenance Hooks
Time-of-Check/Time-of-Use Attacks