YoVDO

Protecting Your System from Security Threats - Linux Security Mechanisms

Offered By: Linux Foundation via YouTube

Tags

Linux Security Courses Embedded Systems Courses Secure Boot Courses Trusted Execution Environment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on securing Linux-based embedded systems against various cyber threats. Learn about essential security mechanisms like DM-Crypt, DM-Verity, Secure Boot, TEE sub-system, FScrypt, and IMA. Discover practical strategies for integrating these mechanisms into diverse embedded systems, including mobile phones, tablets, network-attached DVRs, routers, and IoT hubs, while optimizing limited hardware resources. Gain insights from Gilad Ben-Yossef, a principal software engineer at Arm, as he delves into topics such as trust, fail-safe systems, chain of trust, full disk encryption, Trust Zone, and the Integrity Measurement Architecture. Enhance your understanding of building resilient Linux-based systems to protect against nefarious attacks in the ever-evolving landscape of cybersecurity.

Syllabus

Introduction
Who am I
Storytime
What happened
The problem definition
What does trust mean
What does it mean to fail safely
How do you build your system
Secure Boot
Chain of Trust
Change of Trust
DM Verity
Miracle Tree
Verity
Full Disk Encryption
System Setup
Encryption
Encryption Example
Trust Zone
Keyblob
Hubble Model
Advanced System Setup
Integrity Measurement Architecture
EVM


Taught by

Linux Foundation

Tags

Related Courses

Protecting Devices and Applications in Microsoft 365
Pluralsight
vSphere 6.7 Professional Part 04: Securing a Deployment
LinkedIn Learning
VMware vSphere 7 Professional: 04 Securing a vSphere Deployment
LinkedIn Learning
The One Weird Trick SecureROM Hates - Vol. 2
nullcon via YouTube
I Boot when U-Boot
nullcon via YouTube