Next:
2.8.1 Definitions
Up:
2. Lecture Notes
Previous:
2.7.5 Summary
2.8 Computer Security: Why you should never trust a computer system
Goal: Prevent Misuse of computers
Definitions
Authentication
Private and Public Key Encryption
Access Control and Capabilities
Enforcement of security policies
Examples of Security Problems
Subsections
2.8.1 Definitions
2.8.2 Authentication
2.8.3 Authentication in distributed systems: Private Key Encryption
2.8.4 Public Key Encryption
2.8.5 Secure Socket Layer
2.8.6 Authorisation
2.8.7 Enforcement
2.8.8 Trusted Computing Platform
2.8.9 Firewalls
2.8.10 Classes of security problems
2.8.11 Lessons
Next:
2.8.1 Definitions
Up:
2. Lecture Notes
Previous:
2.7.5 Summary
Ian Wakeman 2005-02-22