Course MIT "Security of computer systems." Lecture 4: "Separation of privileges", part 3

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 4: "Division of privileges", part 2

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 3: "Buffer overflow: exploits and protection", part 1

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 2: "Control of hacker attacks", part 1

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 2: "Control of hacker attacks", part 2

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 2: "Control of hacker attacks", part 3

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Problems of ensuring 100% of the project

To argue that the site should always be available is maverick and banal, but 100% availability, although a mandatory requirement, is often still an inaccessible ideal. Now there are a lot of solutions on the market that promise maximum uptime or offer solutions to increase it, but their application is not enough, which does not always help, in some cases even lead to increased risks and reduced project availability. In this article, we will go over the classic mistakes that we constantly face. Most of the problems are elementary, but people allow them again and again.
 
Problems of ensuring 100% of the project ...
+ 0 -

Missed deadline, or why more than half of the companies were not ready for GDPR

Missed deadline, or why more than half of the companies were not ready for GDPRIn recent days, letters to the mail regularly from different companies, applications, services and sites that you have ever used or where your accounts started. The letters are about the same - they report a change in the privacy policy and explain how the company processes personal data.
 
 
We are already wrote about that , what exactly changes in the data processing policies of major IT companies: WhatsApp, Facebook, Instagram and Twitter. Now we understand why dozens of letters from many services began to come only now, after a formal deadline for the GDPR, why not all companies were ...
+ 0 -

As forgotten for 12 years, the server can manage in 12?000 pounds sterling

As forgotten for 12 years, the server can manage in 12?000 pounds sterlingJust a few days before the entry into force of the GDPR, the University of Greenwich suffered trouble. The Information Commissioner's Office fined the university for £ 12?000 (at the time of writing this is about 136 thousand euros, 160 thousand US dollars, 10 million Russian rubles, 4.2 million Ukrainian hryvnia) for a serious security vulnerability, which led to the leakage of data of almost 20 thousand students and employees. As such a serious university managed to get under the ICO distribution and become the first university to be fined for violating the DPA, and what it teaches us, read under ...
+ 0 -

REG.RU selected 70 thousand customers from a partner who independently started registering domains

Yesterday brought the owners of 7?000 domains that were registered with the Beget hostess through the REG.RU registrar, not very pleasant news: the registrar and the hoster quarreled and the registrar took to his service all the customer domains , which they registered through the hoster.
 
 
REG.RU connects this with "systematic violations of the rules of working with customers and a contract for the provision of services" from their old partner.
 
 
REG.RU selected 70 thousand customers from a partner who independently started registering domains
 
Without the demand transferred ...
+ 0 -