Retrospective - 26 Years of Flexible Mandatory Access Control
Offered By: Linux Foundation via YouTube
Course Description
Overview
Syllabus
Intro
MAC: Background & Motivation
MAC: Desired Properties
Traditional MAC • Feed security policy models derived from government clearance/classification system
Traditional MAC: Gaps • Required trusted subjects that could override the security model • Ladied a mechanism to effectively contine and protect the trusted
Type Enforcement (TE)
TE vs Traditional MAC
Flexible MAC Architecture
DTOS Approach to MAC: Benefits • Assurable implementation
Flask & Dynamic Security Policies
Going Mainstream: SE Linux
SELinux Flask in a Monolithic Kernel
SELinux Flask in Linux Userspace
Branching Out: SE BSD and SE Darwin
Android: MAC applied
MAC meets Virtualization
Hypervisors: Microkernels Revisited
SVP: MAC in a system architecture
MAC Futures • Advancing usability without sacrificing security . Composing MAC models Distributed MAC enforcement and management
Taught by
Linux Foundation
Tags
Related Courses
Check Point Jump Start: Harmony MobileCheckpoint via Coursera Check Point Jump Start: Harmony Mobile
Checkpoint via edX Mobile Security Fundamentals
Cybrary CNIT 128: Hacking Mobile Devices
CNIT - City College of San Francisco via Independent Learning Mobile Device Security
LinkedIn Learning