Computer Systems Security [Outline]

Computer security studies the design and implementation of secure computer systems. It helps trainees how to build secure computer systems in detail. The post covers threat models, attacks that compromise security, and techniques for achieving security.

  1. Introduction, Threat Models Contents
  2. Control Hijacking Attacks
  3. Buffer Overflow Exploits and Defenses
  4. Privilege Separation
  5. Capabilities
  6. Sandboxing Native Code
  7. Web Security Model
  8. Securing Web Applications
  9. Network Security
  10. Network Protocols
  11. SSL and HTTPS
Introduction, Threat Models
Control Hijacking Attacks
Buffer Overflow Exploits and Defenses
Privilege Separation
Sandboxing Native Code
Web Security Model
Securing Web Applications
Network Security
Network Protocols

Leave a Reply

Your email address will not be published. Required fields are marked *