Security

9.1 THE SECURITY ENVIRONMENT

9.1.1 Threats

9.1.2 Intruders

9.1.3 Accidental Data Loss

9.2 BASICS OF CRYPTOGRAPHY

9.2.1 Secret-Key Cryptography

9.2.2 Public-Key Cryptography

9.2.3 One-Way Functions

9.2.4 Digital Signatures

9.2.5 Trusted Platform Module

9.3 PROTECTION MECHANISMS

9.3.1 Protection Domains

9.3.2 Access Control Lists

9.3.3 Capabilities

9.3.4 Trusted systems

9.3.5 Trusted Computing Base

9.3.6 Formal Models of Secure Systems

9.3.7 Multilevel Security

9.3.8 Covert Channels

9.4 AUTHENTICATION

9.4.1 Authentication Using Passwords

9.4.2 Authentication Using a Physical Object

9.4.3 Authentication Using Biometrics

9.5 INSIDER ATTACKS

9.5.1 Logic Bombs

9.5.2 Trap Doors

9.5.3 Login Spoofing

9.6 EXPLOITING CODE BUGS

9.6.1 Buffer Overflow Attacks

9.6.2 Format String Attacks

9.6.3 Return to libc Attacks

9.6.4 Integer Overflow Attacks

9.6.5 Code Injection Attacks

9.6.6 Privilege Escalation Attacks

9.7 MALWARE

9.7.1 Trojan Horses

9.7.2 Viruses

9.7.3 Worms

9.7.4 Spyware

9.7.5 Rootkits

9.8 DEFENSES

9.8.1 Firewalls

9.8.2 Antivirus and Anti-Antivirus Techniques

9.8.3 Code Signing

9.8.4 Jailing

9.8.5 Model-Based Intrusion Detection

9.8.6 Encapsulating Mobile Code

9.8.7 Java Security

9.9 RESEARCH ON SECURITY

9.10 SUMMARY

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-Share Alike 2.5 License.