1.9 Security

Threats

  • Operating systems need to be able to behave correctly in the face of malicious actors

Objectives

  • Confidentiality
  • Integrity
  • Availability
  • Accountability
CIA Triad

2 Threads

2.2 Example Multi-threaded Program