| 
                           
                              | 
                                       William Stallings, Ph.D.
                                          | Chapter 17 – | Operating System Security |  
 Chapter Contents:
 
 
 
                                       
                                          |  | 17.1 |  | Information Protection and Security |  
                                          |  | 17.2 |  | Requirements for Operating System Security |  
                                          |  | 17.2.1 |  | Requirements |  
                                          |  | 17.2.2 |  | Computer System Assets |  
                                          |  | 17.2.2.1 |  | Hardware |  
                                          |  | 17.2.2.2 |  | Software |  
                                          |  | 17.2.2.3 |  | Data |  
                                          |  | 17.2.3 |  | Design Principles |  
                                          |  | 17.3 |  | Protection Mechanisms |  
                                          |  | 17.3.1. |  | Protection of Memory |  
                                          |  | 17.3.2 |  | User-Oriented Access Control |  
                                          |  | 17.3.3 |  | Data-Oriented Access Control |  
                                          |  | 17.3.4 |  | Protection Based on an Operating System Mode |  
                                          |  | 17.4 |  | File Sharing |  
                                          |  | 17.4.1 |  | Access Rights |  
                                          |  | 17.4.2 |  | Simultaneous Access |  
                                          |  | 17.5 |  | Trusted Systems |  
                                          |  | 17.5.1 |  | Trojan Horse Defense |  
                                          |  | 17.6 |  | Windows 2000 Security |  
                                          |  | 17.6.1 |  | Access Control Scheme |  
                                          |  | 17.6.2 |  | Access Token |  
                                          |  | 17.6.3 |  | Security Descriptors |  
                                          |  | 17.7 |  | Notes |  
                                          |  | 17.8 |  | Further Reading |  
                                          |  | 17.9 |  | References |  
 |  | 
                  
                     |  |