| Chapter 17 –  | 
                                          Operating System Security | 
                                        
                                     
                                        
                                    William Stallings, Ph.D.
  Chapter Contents:
 
 
                                       
                                          |    | 
                                          17.1 | 
                                             | 
                                          Information Protection and Security
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          17.2 | 
                                             | 
                                          Requirements for Operating System Security
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          17.2.1 | 
                                             | 
                                          Requirements
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.2.2 | 
                                             | 
                                          Computer System Assets
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.2.2.1 | 
                                             | 
                                          Hardware
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          17.2.2.2 | 
                                             | 
                                          Software
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          17.2.2.3 | 
                                             | 
                                          Data
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          17.2.3 | 
                                             | 
                                          Design Principles
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.3 | 
                                             | 
                                          Protection Mechanisms
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          17.3.1. | 
                                             | 
                                          Protection of Memory
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.3.2 | 
                                             | 
                                          User-Oriented Access Control
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.3.3 | 
                                             | 
                                          Data-Oriented Access Control
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.3.4 | 
                                             | 
                                          Protection Based on an Operating System Mode
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.4 | 
                                             | 
                                          File Sharing
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          17.4.1 | 
                                             | 
                                          Access Rights
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.4.2 | 
                                             | 
                                          Simultaneous Access
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.5 | 
                                             | 
                                          Trusted Systems
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          17.5.1 | 
                                             | 
                                          Trojan Horse Defense
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.6 | 
                                             | 
                                          Windows 2000 Security
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          17.6.1 | 
                                             | 
                                          Access Control Scheme
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.6.2 | 
                                             | 
                                          Access Token
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.6.3 | 
                                             | 
                                          Security Descriptors
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          17.7 | 
                                             | 
                                          Notes
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          17.8 | 
                                             | 
                                          Further Reading
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          17.9 | 
                                             | 
                                          References
                                                 
                                           | 
                                        
                                     
  | 
                            
                         
                      | 
                  
                  
                      |