Security Solutions
How Can we Layer Security Solutions?
Exploration
Read chapter six Computer Systems Security: Planning for Success Read chapter fifty-four in OSTEP
Activities
Monday: Laboratory session Tuesday and Thursday: Security Solutions - Understand the trade-offs in security solutions
- Learn how hardware and software can be used to protect systems
- Learn more about the “defense in depth” strategy to security
- Discover how an operating system plays a critical role in security
- Continued highlighting of the concept of a “security synapse”
- Student presentations that feature:
- Explanation of a high-level concepts behind security solutions
- In-class activity that connects concepts to real-world scenarios
- Hands-on examples of the operation and behavior of security solutions
- Demonstrate the use of a practical security solution