Skip main navigation
PLUSSA
v1.11.4
COMP.SEC.100 COMP.SEC.100 Kyberturvallisuus I / Cyber Security I
Begin by enrolling in a course.
Toggle navigation
Log in
Skip course navigation
Language
Change language
suomi
suomi
Course
COMP.SEC.100
Course materials
Your points
Lyhytvideot
Mitä tarkoittaa riski?
(opens in a new tab)
Inhimilliset tekijät
(opens in a new tab)
Käyttäjän manipulointi
(opens in a new tab)
Haittaohjelmat ja hyökkäystekniikat
(opens in a new tab)
Diffie-Hellman-Merklen avaintenvaihto
(opens in a new tab)
Verkon tietoturvatyökalut
(opens in a new tab)
Site
Home
Begin by enrolling in a course.
Log in
Skip course navigation
Language
Change language
suomi
suomi
Course
COMP.SEC.100
Course materials
Your points
Lyhytvideot
Mitä tarkoittaa riski?
(opens in a new tab)
Inhimilliset tekijät
(opens in a new tab)
Käyttäjän manipulointi
(opens in a new tab)
Haittaohjelmat ja hyökkäystekniikat
(opens in a new tab)
Diffie-Hellman-Merklen avaintenvaihto
(opens in a new tab)
Verkon tietoturvatyökalut
(opens in a new tab)
«
12.4 Operating System Security Principles and Models
Course materials
12.6 Operating System Hardening
»
COMP.SEC.100
12. Operating Systems and Virtualisation
12.5 Primitives for Isolation and Mediation
Primitives for Isolation and Mediation
¶
Loading assignment...
Authentication and Identification
¶
Access control lists
¶
Capabilities
¶
Physical access and secure deletion
¶
Memory protection and address spaces
¶
Modern hardware extensions for memory protection
¶
Protection rings
¶
One ring to rule them all. And another. And another
¶
Low-end devices and the IoT
¶
Posting submission...
«
12.4 Operating System Security Principles and Models
Course materials
12.6 Operating System Hardening
»
Loading...
Loading...
×
None
×
No matches