Description
In this module, you will learn about General Operating System Protection, Operating System Protection, Trusted Computing Base, Trusted Computing Base Requirements and Functions, Reference Monitor, Security Kernel. Security Perimeter, Layering, TOC/TOU Protection, Guard Protection, Process Isolation, Hardening, Memory Protection, Isolation, Binding, CPU Protection, Input and Output Device Protection, Application Layer Protection, Storage Device Protection, Network Protection, and Data Transmission Controls.