Outline for May 31, 2006

Reading: text, §18.2, 19.1—19.1.2

  1. Greetings and felicitations!
  2. Building secure and trusted systems
    1. Life cycle
    2. Waterfall life cycle model
    3. Other models
  3. Requirements
    1. Threats
    2. Vulnerabilities
    3. Layered architectures
    4. Reference monitors and validation mechanisms
    5. Security kernel and TCB
    6. Examples

Version of May 31, 2006 at 8:40 PM

You can also obtain a PDF version of this.