Page 77 - DCAP516_COMPUTER_SECURITY
P. 77

Manmohan Sharma, Lovely Professional University
                                                                           Unit 7: Designing Trusted Operating System



                   Unit 7: Designing Trusted Operating System                                   Notes


            CONTENTS
            Objectives
            Introduction
            7.1  Security Concerns

            7.2  What is a Trusted System?
            7.3  Security Policies
            7.4  Models of Security
            7.5  What is a Trusted Operating System?

                 7.5.1  Trust in What?
                 7.5.2  Features of Trusted OS
                 7.5.3  When is an Operating System said to be Trusted?
            7.6  Trusted Operating System Design
            7.7  Assurance in Operating Systems
                 7.7.1  Assurance Criteria

            7.8  Summary
            7.9  Keywords
            7.10 Review Questions
            7.11 Further Readings

          Objectives


          After studying this unit, you will be able to:
               Overview of trusted systems
               Understand the trusted operating system
               Get brief idea about security features of a trusted operating system

               Give assurance to other for trusted operating system
          Introduction


          Computer technology has developed rapidly, the same time it brings more opportunities for
          information theft, tamper and destruction. Information security has become a research focus.
          The security of operating system, as the base of information system, is particularly important.
          With the developing of 40 years, the security operating system has made certain achievements.
          However, it still exist some problems. Trusted operating system which is based on trusted
          computing can help solve the problems.
          An operating system is a software component that acts as the core of a computer system.
          It performs various functions and is essentially the interface that connects your computer and its
          supported components. In this Unit, we will discuss the basic security concerns of the operating
          system.



                                           LOVELY PROFESSIONAL UNIVERSITY                                   71
   72   73   74   75   76   77   78   79   80   81   82