Skip main navigation
PLUSSA

v1.11.4

  • COMP.SEC.100 COMP.SEC.100 Kyberturvallisuus I / Cyber Security I
    • Begin by enrolling in a course.
  • Log in
  • Skip course navigation
  • Language

  • Change language

    Course

  • COMP.SEC.100
  • Course materials
  • Your points
  • Lyhytvideot

  • Mitä tarkoittaa riski? (opens in a new tab)
  • Inhimilliset tekijät (opens in a new tab)
  • Käyttäjän manipulointi (opens in a new tab)
  • Haittaohjelmat ja hyökkäystekniikat (opens in a new tab)
  • Diffie-Hellman-Merklen avaintenvaihto (opens in a new tab)
  • Verkon tietoturvatyökalut (opens in a new tab)
  • Site

  • Home
    • Begin by enrolling in a course.
  • Log in
  • Skip course navigation
  • Language

  • Change language

    Course

  • COMP.SEC.100
  • Course materials
  • Your points
  • Lyhytvideot

  • Mitä tarkoittaa riski? (opens in a new tab)
  • Inhimilliset tekijät (opens in a new tab)
  • Käyttäjän manipulointi (opens in a new tab)
  • Haittaohjelmat ja hyökkäystekniikat (opens in a new tab)
  • Diffie-Hellman-Merklen avaintenvaihto (opens in a new tab)
  • Verkon tietoturvatyökalut (opens in a new tab)
« 12.4 Operating System Security Principles and Models Course materials 12.6 Operating System Hardening »
  1. COMP.SEC.100
  2. 12. Operating Systems and Virtualisation
  3. 12.5 Primitives for Isolation and Mediation

Primitives for Isolation and Mediation¶

Loading assignment...

Authentication and Identification¶

Access control lists¶

Capabilities¶

Physical access and secure deletion¶

Memory protection and address spaces¶

Modern hardware extensions for memory protection¶

Protection rings¶

One ring to rule them all. And another. And another¶

Low-end devices and the IoT¶

Posting submission...
« 12.4 Operating System Security Principles and Models Course materials 12.6 Operating System Hardening »
  • Privacy Notice
  • Accessibility Statement
  • Support
  • Feedback (opens in a new tab)
  • PLUSSA v1.11.4

Loading...
Loading...

  • No matches