neue Vorlesung; Inhaltsverzeichnis
This commit is contained in:
		
							parent
							
								
									f4e6d96450
								
							
						
					
					
						commit
						1173feae06
					
				
							
								
								
									
										152
									
								
								Systemsicherheit.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										152
									
								
								Systemsicherheit.md
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,152 @@ | ||||
| - [Introduction](#introduction) | ||||
|   - [Risk Scenarios](#risk-scenarios) | ||||
|   - [Security Goals](#security-goals) | ||||
|   - [Security Engineering](#security-engineering) | ||||
|   - [Lecture Roadmap](#lecture-roadmap) | ||||
| - [Security Requirements](#security-requirements) | ||||
|   - [Vulnerabilities](#vulnerabilities) | ||||
|     - [Human](#human) | ||||
|     - [Organizational](#organizational) | ||||
|     - [Technical](#technical) | ||||
|     - [Summary](#summary) | ||||
|   - [Threats](#threats) | ||||
|     - [Attackers](#attackers) | ||||
|     - [Attack Methods](#attack-methods) | ||||
|     - [Damager Potential](#damager-potential) | ||||
|     - [Summary](#summary-1) | ||||
|   - [Risk Analysis](#risk-analysis) | ||||
|   - [Summary](#summary-2) | ||||
| - [Security Policies and Models](#security-policies-and-models) | ||||
|   - [Security Policies](#security-policies) | ||||
|   - [Security Models](#security-models) | ||||
|     - [Access Control Models](#access-control-models) | ||||
|       - [IBAC](#ibac) | ||||
|       - [RBAC](#rbac) | ||||
|       - [ABAC](#abac) | ||||
|       - [Summary](#summary-3) | ||||
|     - [Information Flow Models](#information-flow-models) | ||||
|       - [Denning](#denning) | ||||
|       - [MLS](#mls) | ||||
|       - [BLP](#blp) | ||||
|       - [Biba](#biba) | ||||
|       - [Summary](#summary-4) | ||||
|     - [Non-interference Models](#non-interference-models) | ||||
|     - [Hybrid Models](#hybrid-models) | ||||
|       - [Brewer-Nash](#brewer-nash) | ||||
|       - [LR-CW](#lr-cw) | ||||
|       - [MLS-CW](#mls-cw) | ||||
| - [Practical Security Engineering](#practical-security-engineering) | ||||
|   - [Model Engineering](#model-engineering) | ||||
|   - [Model Specification](#model-specification) | ||||
|     - [CorPS](#corps) | ||||
|     - [SELinux Policy Language](#selinux-policy-language) | ||||
|   - [Summary](#summary-5) | ||||
| - [Security Mechanisms](#security-mechanisms) | ||||
|   - [Authorization](#authorization) | ||||
|     - [Access Control Lists](#access-control-lists) | ||||
|     - [Capability Lists](#capability-lists) | ||||
|     - [Interceptors](#interceptors) | ||||
|     - [Summary](#summary-6) | ||||
|   - [Cryptographic Mechanisms](#cryptographic-mechanisms) | ||||
|     - [Encryption](#encryption) | ||||
|       - [Symmetric](#symmetric) | ||||
|       - [Asymmetric](#asymmetric) | ||||
|     - [Cryptographic Hashing](#cryptographic-hashing) | ||||
|     - [Digital Signatures](#digital-signatures) | ||||
|     - [Cryptographic Attacks](#cryptographic-attacks) | ||||
|   - [Identification and Authentication](#identification-and-authentication) | ||||
|     - [Passwords](#passwords) | ||||
|     - [Biometrics](#biometrics) | ||||
|     - [Cryptographic Protocols](#cryptographic-protocols) | ||||
|       - [SmartCards](#smartcards) | ||||
|       - [Authentication Protocols](#authentication-protocols) | ||||
|   - [Summary](#summary-7) | ||||
| - [Security Architectures](#security-architectures) | ||||
|   - [Design Principles](#design-principles) | ||||
|   - [Operating Systems Architectures](#operating-systems-architectures) | ||||
|     - [Nizza](#nizza) | ||||
|     - [SELinux](#selinux) | ||||
|   - [Distributed Systems Architectures](#distributed-systems-architectures) | ||||
|     - [CORBA](#corba) | ||||
|     - [Web Services](#web-services) | ||||
|     - [Kerberos](#kerberos) | ||||
|   - [Summary](#summary-8) | ||||
| 
 | ||||
| # Introduction | ||||
| ## Risk Scenarios | ||||
| ## Security Goals | ||||
| ## Security Engineering | ||||
| ## Lecture Roadmap | ||||
| 
 | ||||
| # Security Requirements | ||||
| ## Vulnerabilities | ||||
| ### Human | ||||
| ### Organizational | ||||
| ### Technical | ||||
| ### Summary | ||||
| ## Threats | ||||
| ### Attackers | ||||
| ### Attack Methods | ||||
| ### Damager Potential | ||||
| ### Summary | ||||
| ## Risk Analysis | ||||
| ## Summary | ||||
| 
 | ||||
| # Security Policies and Models | ||||
| ## Security Policies | ||||
| ## Security Models | ||||
| ### Access Control Models | ||||
| #### IBAC | ||||
| #### RBAC | ||||
| #### ABAC | ||||
| #### Summary | ||||
| ### Information Flow Models | ||||
| #### Denning | ||||
| #### MLS | ||||
| #### BLP | ||||
| #### Biba | ||||
| #### Summary | ||||
| ### Non-interference Models | ||||
| ### Hybrid Models | ||||
| #### Brewer-Nash | ||||
| #### LR-CW | ||||
| #### MLS-CW | ||||
| 
 | ||||
| # Practical Security Engineering | ||||
| ## Model Engineering  | ||||
| ## Model Specification  | ||||
| ### CorPS | ||||
| ### SELinux Policy Language | ||||
| ## Summary | ||||
| 
 | ||||
| # Security Mechanisms | ||||
| ## Authorization | ||||
| ### Access Control Lists | ||||
| ### Capability Lists | ||||
| ### Interceptors | ||||
| ### Summary | ||||
| ## Cryptographic Mechanisms | ||||
| ### Encryption | ||||
| #### Symmetric | ||||
| #### Asymmetric | ||||
| ### Cryptographic Hashing | ||||
| ### Digital Signatures | ||||
| ### Cryptographic Attacks | ||||
| ## Identification and Authentication | ||||
| ### Passwords | ||||
| ### Biometrics | ||||
| ### Cryptographic Protocols | ||||
| #### SmartCards | ||||
| #### Authentication Protocols | ||||
| ## Summary | ||||
| 
 | ||||
| # Security Architectures | ||||
| ## Design Principles | ||||
| ## Operating Systems Architectures | ||||
| ### Nizza | ||||
| ### SELinux  | ||||
| ## Distributed Systems Architectures | ||||
| ### CORBA  | ||||
| ### Web Services  | ||||
| ### Kerberos  | ||||
| ## Summary  | ||||
		Loading…
	
		Reference in New Issue
	
	Block a user