Terms you'll need to understand:
Buffer overflows
Security modes
Rings of protection
Trusted Computer System Evaluation Criteria (TCSEC)
Information Technology System Evaluation Criteria (ITSEC)
System vulnerabilities
Common Criteria
Reference monitor
Trusted computing base
Open and closed systems
Techniques you'll need to master:
Understanding confidentiality models, such as Bell-LaPadula
Identifying integrity models, such as Biba and Clark-Wilson
Understanding common flaws and security issues associated with system-architecture designs
Distinguishing between certification and accreditation
The systems architecture and models domain deals with system hardware and the software that interacts with it. This ...
No credit card required