Data Protection and Security

   

VI

Operating System Security and Secure Programming

   

VI.II

Operating System Security

   

   
 

The reference monitor is an abstract concept, the security kernel is its implementation, and the trusted computing base contains the security kernel among other protection mechanisms.

Three rules:

  1. Keep the security kernel of an operating system as simple as possible.
  2. Users must not be able to modify the security kernel of the operating system.
  3. Operating system has to prevent users from accidentally or intentionally accessing other users’ data.

   

   
       
 
«previous session [1] [2] [3] [4] [5] [6] [7] next session »
   
       
 
«proceed to previous sectionproceed to next section »
  chapter index