Page 77 - DCAP516_COMPUTER_SECURITY
P. 77
Manmohan Sharma, Lovely Professional University
Unit 7: Designing Trusted Operating System
Unit 7: Designing Trusted Operating System Notes
CONTENTS
Objectives
Introduction
7.1 Security Concerns
7.2 What is a Trusted System?
7.3 Security Policies
7.4 Models of Security
7.5 What is a Trusted Operating System?
7.5.1 Trust in What?
7.5.2 Features of Trusted OS
7.5.3 When is an Operating System said to be Trusted?
7.6 Trusted Operating System Design
7.7 Assurance in Operating Systems
7.7.1 Assurance Criteria
7.8 Summary
7.9 Keywords
7.10 Review Questions
7.11 Further Readings
Objectives
After studying this unit, you will be able to:
Overview of trusted systems
Understand the trusted operating system
Get brief idea about security features of a trusted operating system
Give assurance to other for trusted operating system
Introduction
Computer technology has developed rapidly, the same time it brings more opportunities for
information theft, tamper and destruction. Information security has become a research focus.
The security of operating system, as the base of information system, is particularly important.
With the developing of 40 years, the security operating system has made certain achievements.
However, it still exist some problems. Trusted operating system which is based on trusted
computing can help solve the problems.
An operating system is a software component that acts as the core of a computer system.
It performs various functions and is essentially the interface that connects your computer and its
supported components. In this Unit, we will discuss the basic security concerns of the operating
system.
LOVELY PROFESSIONAL UNIVERSITY 71