Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Best Linux Exp

Best Linux Exp

Ratings: (0)|Views: 35 |Likes:
Published by Ashok K

More info:

Published by: Ashok K on Aug 21, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

05/14/2010

pdf

text

original

 
CS426 Fall 2006/Lecture 81
Computer SecurityCS 426
Lecture 8
 
Access Control for ProcessConfinement
 
CS426Fall 2006/Lecture 82
Readings for this lecture
Additional readings
 –Best Practices for UNIX chroot() Operations, –The Linux kernel capabilities FAQ –wikipedia topics: Introduction to virtualization,Operating system-level virtualization, FreeBSD jail,
 
CS426Fall 2006/Lecture 83
Review & Motivation
Softwares have vulnerabilities
 –most prominent is memory errors (e.g., buffer overflow, …)
Vulnerabilities can be exploited
Many layers of defense mechanisms exist
 –no mechanism is silver bullet
Security implications often caused by issues inaccess control?
Can we fix access control?

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->