Outline for May 31, 2006
Reading: text, §18.2, 19.1—19.1.2
- Greetings and felicitations!
- Building secure and trusted systems
- Life cycle
- Waterfall life cycle model
- Other models
- Requirements
- Threats
- Vulnerabilities
- Layered architectures
- Reference monitors and validation mechanisms
- Security kernel and TCB
- Examples
Version of May 31, 2006 at 8:40 PM
You can also obtain a PDF version of this.