YoVDO

Integrity Protection and Access Control - Who Do You Trust?

Offered By: Linux Foundation via YouTube

Tags

Access Control Courses Linux Security Courses Privilege Escalation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical intersection of integrity protection and access control in this 39-minute conference talk by Glenn Wurster from BlackBerry. Delve into the vulnerabilities of file systems and boot processes against physical attacks, and understand why on-line access control alone is insufficient. Learn about a Linux Security Module (LSM) developed for the BlackBerry Priv that links elevated privileges to integrity protection, mitigating risks associated with system services executing binaries on user data partitions. Examine the broader implications for operating system security, focusing on mandatory access control and security vulnerability mitigations. Gain insights into topics such as DMCrypt, PathTrust, SuperUser implementation, potential pitfalls, and Linux integrity protection methods. Consider thought-provoking discussion questions on encryption requirements and VM integrity protection, enhancing your understanding of crucial cybersecurity concepts.

Syllabus

Introduction
What can an attacker do
DMCrypt
PathTrust
SuperUser
How does it work
The pitfalls
Discussion questions
Comments
Integrity and Linux
Should Encryption require Integrity
Linux Integrity Protection
VM Integrity Protection
Extended Attributes


Taught by

Linux Foundation

Tags

Related Courses

Linux Server Management and Security
University of Colorado System via Coursera
Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera
Operating Systems and Security
IBM via edX
Linux Security and Hardening, The Practical Security Guide.
Udemy
The Complete Cyber Security Course : Hackers Exposed!
Udemy