• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
• Survey authentication mechanisms • List available access control implementation options • Explain the problems encryption is designed to solve • Understand the various categories of encryption tools as well as the strengths, weaknesses, and applications of each • Learn about certificates and certificate authorities
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
6-磷酸葡萄糖脱氢酶 glucose-6-phosphate dehydrogenase Janbon 综合症 Janbon's syndrome PPB 浓度 parts per billion concentration pphm 浓度 parts per hundred million concentration PPH 浓度 parts per hundred concentration ppm 浓度 parts per million concentration 安全范围 safety range 安全试验法 innocuity test method