Security in Operating
Systems

breaches

Threats

Exposure

Vulnerability

impotant security mechanisms

Passwords

Password Selection Criteria

Attacks on Passwords

Use of Passwords

Authentication

Encryption

Access control mechanisms

Mechanisms vs Policies

Mechanisms determine how to do something

Policies determine what will be done

security goals

Availability

Confidentiality

Integrity

what are we protecting

Communications lines and networks

Data

Hardware

Software

Security and protection

Security is a policy

Protection is a mechanism

Protection mechanisms implement security
policies