A Computer Security course: Centralized Operating Systems

Copyright © 2000 Giovanni Chiola.

This file was last updated on Oct. 15th, 2000.



Centralized Operating Systems




Basic Principles

Users, Resources, and Security Kernel

To be written ...

Least Privilege and Domain Switching

To be written ...

Identification and Access Control Mechanisms

To be written ...

Redundancy and Economy of Control

To be written ...

Virtual Machines and Weakest Point of Attack

To be written ...



Unix/Linux Achilles Heel

Root Account and SETUID Processes

To be written ...

File System Configuration

To be written ...

Shell and Environment Variables

To be written ...

Monitoring Tools

To be written ...

Remote Services and Mount

To be written ...

Buffer Overflows

To be written ...