Integrity Protection and Access Control - Who Do You Trust?
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the critical intersection of integrity protection and access control in this 39-minute conference talk by Glenn Wurster from BlackBerry. Delve into the vulnerabilities of file systems and boot processes against physical attacks, and understand why on-line access control alone is insufficient. Learn about a Linux Security Module (LSM) developed for the BlackBerry Priv that links elevated privileges to integrity protection, mitigating risks associated with system services executing binaries on user data partitions. Examine the broader implications for operating system security, focusing on mandatory access control and security vulnerability mitigations. Gain insights into topics such as DMCrypt, PathTrust, SuperUser implementation, potential pitfalls, and Linux integrity protection methods. Consider thought-provoking discussion questions on encryption requirements and VM integrity protection, enhancing your understanding of crucial cybersecurity concepts.
Syllabus
Introduction
What can an attacker do
DMCrypt
PathTrust
SuperUser
How does it work
The pitfalls
Discussion questions
Comments
Integrity and Linux
Should Encryption require Integrity
Linux Integrity Protection
VM Integrity Protection
Extended Attributes
Taught by
Linux Foundation
Tags
Related Courses
Cybersecurity and Its Ten DomainsUniversity System of Georgia via Coursera Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Computing, Storage and Security with Google Cloud Platform
Google via Coursera