neue Vorlesung; Inhaltsverzeichnis
This commit is contained in:
		
							parent
							
								
									f4e6d96450
								
							
						
					
					
						commit
						1173feae06
					
				
							
								
								
									
										152
									
								
								Systemsicherheit.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										152
									
								
								Systemsicherheit.md
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,152 @@ | |||||||
|  | - [Introduction](#introduction) | ||||||
|  |   - [Risk Scenarios](#risk-scenarios) | ||||||
|  |   - [Security Goals](#security-goals) | ||||||
|  |   - [Security Engineering](#security-engineering) | ||||||
|  |   - [Lecture Roadmap](#lecture-roadmap) | ||||||
|  | - [Security Requirements](#security-requirements) | ||||||
|  |   - [Vulnerabilities](#vulnerabilities) | ||||||
|  |     - [Human](#human) | ||||||
|  |     - [Organizational](#organizational) | ||||||
|  |     - [Technical](#technical) | ||||||
|  |     - [Summary](#summary) | ||||||
|  |   - [Threats](#threats) | ||||||
|  |     - [Attackers](#attackers) | ||||||
|  |     - [Attack Methods](#attack-methods) | ||||||
|  |     - [Damager Potential](#damager-potential) | ||||||
|  |     - [Summary](#summary-1) | ||||||
|  |   - [Risk Analysis](#risk-analysis) | ||||||
|  |   - [Summary](#summary-2) | ||||||
|  | - [Security Policies and Models](#security-policies-and-models) | ||||||
|  |   - [Security Policies](#security-policies) | ||||||
|  |   - [Security Models](#security-models) | ||||||
|  |     - [Access Control Models](#access-control-models) | ||||||
|  |       - [IBAC](#ibac) | ||||||
|  |       - [RBAC](#rbac) | ||||||
|  |       - [ABAC](#abac) | ||||||
|  |       - [Summary](#summary-3) | ||||||
|  |     - [Information Flow Models](#information-flow-models) | ||||||
|  |       - [Denning](#denning) | ||||||
|  |       - [MLS](#mls) | ||||||
|  |       - [BLP](#blp) | ||||||
|  |       - [Biba](#biba) | ||||||
|  |       - [Summary](#summary-4) | ||||||
|  |     - [Non-interference Models](#non-interference-models) | ||||||
|  |     - [Hybrid Models](#hybrid-models) | ||||||
|  |       - [Brewer-Nash](#brewer-nash) | ||||||
|  |       - [LR-CW](#lr-cw) | ||||||
|  |       - [MLS-CW](#mls-cw) | ||||||
|  | - [Practical Security Engineering](#practical-security-engineering) | ||||||
|  |   - [Model Engineering](#model-engineering) | ||||||
|  |   - [Model Specification](#model-specification) | ||||||
|  |     - [CorPS](#corps) | ||||||
|  |     - [SELinux Policy Language](#selinux-policy-language) | ||||||
|  |   - [Summary](#summary-5) | ||||||
|  | - [Security Mechanisms](#security-mechanisms) | ||||||
|  |   - [Authorization](#authorization) | ||||||
|  |     - [Access Control Lists](#access-control-lists) | ||||||
|  |     - [Capability Lists](#capability-lists) | ||||||
|  |     - [Interceptors](#interceptors) | ||||||
|  |     - [Summary](#summary-6) | ||||||
|  |   - [Cryptographic Mechanisms](#cryptographic-mechanisms) | ||||||
|  |     - [Encryption](#encryption) | ||||||
|  |       - [Symmetric](#symmetric) | ||||||
|  |       - [Asymmetric](#asymmetric) | ||||||
|  |     - [Cryptographic Hashing](#cryptographic-hashing) | ||||||
|  |     - [Digital Signatures](#digital-signatures) | ||||||
|  |     - [Cryptographic Attacks](#cryptographic-attacks) | ||||||
|  |   - [Identification and Authentication](#identification-and-authentication) | ||||||
|  |     - [Passwords](#passwords) | ||||||
|  |     - [Biometrics](#biometrics) | ||||||
|  |     - [Cryptographic Protocols](#cryptographic-protocols) | ||||||
|  |       - [SmartCards](#smartcards) | ||||||
|  |       - [Authentication Protocols](#authentication-protocols) | ||||||
|  |   - [Summary](#summary-7) | ||||||
|  | - [Security Architectures](#security-architectures) | ||||||
|  |   - [Design Principles](#design-principles) | ||||||
|  |   - [Operating Systems Architectures](#operating-systems-architectures) | ||||||
|  |     - [Nizza](#nizza) | ||||||
|  |     - [SELinux](#selinux) | ||||||
|  |   - [Distributed Systems Architectures](#distributed-systems-architectures) | ||||||
|  |     - [CORBA](#corba) | ||||||
|  |     - [Web Services](#web-services) | ||||||
|  |     - [Kerberos](#kerberos) | ||||||
|  |   - [Summary](#summary-8) | ||||||
|  | 
 | ||||||
|  | # Introduction | ||||||
|  | ## Risk Scenarios | ||||||
|  | ## Security Goals | ||||||
|  | ## Security Engineering | ||||||
|  | ## Lecture Roadmap | ||||||
|  | 
 | ||||||
|  | # Security Requirements | ||||||
|  | ## Vulnerabilities | ||||||
|  | ### Human | ||||||
|  | ### Organizational | ||||||
|  | ### Technical | ||||||
|  | ### Summary | ||||||
|  | ## Threats | ||||||
|  | ### Attackers | ||||||
|  | ### Attack Methods | ||||||
|  | ### Damager Potential | ||||||
|  | ### Summary | ||||||
|  | ## Risk Analysis | ||||||
|  | ## Summary | ||||||
|  | 
 | ||||||
|  | # Security Policies and Models | ||||||
|  | ## Security Policies | ||||||
|  | ## Security Models | ||||||
|  | ### Access Control Models | ||||||
|  | #### IBAC | ||||||
|  | #### RBAC | ||||||
|  | #### ABAC | ||||||
|  | #### Summary | ||||||
|  | ### Information Flow Models | ||||||
|  | #### Denning | ||||||
|  | #### MLS | ||||||
|  | #### BLP | ||||||
|  | #### Biba | ||||||
|  | #### Summary | ||||||
|  | ### Non-interference Models | ||||||
|  | ### Hybrid Models | ||||||
|  | #### Brewer-Nash | ||||||
|  | #### LR-CW | ||||||
|  | #### MLS-CW | ||||||
|  | 
 | ||||||
|  | # Practical Security Engineering | ||||||
|  | ## Model Engineering  | ||||||
|  | ## Model Specification  | ||||||
|  | ### CorPS | ||||||
|  | ### SELinux Policy Language | ||||||
|  | ## Summary | ||||||
|  | 
 | ||||||
|  | # Security Mechanisms | ||||||
|  | ## Authorization | ||||||
|  | ### Access Control Lists | ||||||
|  | ### Capability Lists | ||||||
|  | ### Interceptors | ||||||
|  | ### Summary | ||||||
|  | ## Cryptographic Mechanisms | ||||||
|  | ### Encryption | ||||||
|  | #### Symmetric | ||||||
|  | #### Asymmetric | ||||||
|  | ### Cryptographic Hashing | ||||||
|  | ### Digital Signatures | ||||||
|  | ### Cryptographic Attacks | ||||||
|  | ## Identification and Authentication | ||||||
|  | ### Passwords | ||||||
|  | ### Biometrics | ||||||
|  | ### Cryptographic Protocols | ||||||
|  | #### SmartCards | ||||||
|  | #### Authentication Protocols | ||||||
|  | ## Summary | ||||||
|  | 
 | ||||||
|  | # Security Architectures | ||||||
|  | ## Design Principles | ||||||
|  | ## Operating Systems Architectures | ||||||
|  | ### Nizza | ||||||
|  | ### SELinux  | ||||||
|  | ## Distributed Systems Architectures | ||||||
|  | ### CORBA  | ||||||
|  | ### Web Services  | ||||||
|  | ### Kerberos  | ||||||
|  | ## Summary  | ||||||
		Loading…
	
		Reference in New Issue
	
	Block a user