Protection & Security Introduction to Operating Systems: Module 16.
1 Security Chapter 10. 2 Security Requirements Confidentiality –information only accessible for reading by authorized parties Integrity –Computer assets.
1 Security Chapter 16. 2 Bad Things Intrusion (e.g. Trojan Horse Program) – Breaking into the computer and gaining access to its programs and data. Hardware.
1 Security and Protection Chapter 9 Advanced Operating System.
Security