Xem mẫu
Operating Systems: Internals and Design Principles,
6/E William Stallings
Chapter 15 Computer Security Techniques
Dave Bremer
Otago Polytechnic, N.Z.
Roadmap
• Authentication • Access Control
• Intrusion
• Malware
Detection
Defense
• Dealing With Buffer Overflow Attacks • Windows Vista Security
Authentication
• Basis for most type of access control and accountability
• Two steps
– Identification – Verification
Means of Authentication
• Traditionally listed as three factors • Something you know
– Password, PIN
• Something you have – Card, RFID badge
• Something you are – Biometrics
A different take
• Nick Mathewson is attributed with turning these factors into:
– Something – Something
– Something
you had, you forgot,
you were!
...
- tailieumienphi.vn
nguon tai.lieu . vn