In this video, learn about SELinux, SEAndroid, TrustedSolaris, and least functionality.
- [Instructor] When it comes to security,…not all operating systems are created equal.…A trusted operating system is an OS…that provides sufficient support for multilevel security…in order to meet a set of government requirements…that were developed by the National Computer Security Center…for the United States Department of Defense.…The requirements for a trusted operating system…were originally found in the trusted computer systems…evaluation criteria book, referred to as the Orange Book.…It used the Bell-LaPadula model…to rate the security offered…by an individual computer security product,…including operating systems.…
Over time, the Orange Book was replaced…by the common criteria or CC…with its seven evaluation assurance levels…being used to rate the systems.…EAL1 is considered the lowest level,…and EAL7 is considered the highest level of assurance.…A trusted operating system should be used in any situation…where security is considered the most important thing…in your system design.…While these systems provide…
Author
Released
8/27/2018- Network and security components
- Security solutions in the architecture
- Securing host devices
- Securing mobile and small form factor devices
- Software vulnerabilities
Skill Level Advanced
Duration
Views
Related Courses
-
CASP+ Cert Prep: 1 Risk Management
with Jason Dion2h 34m Advanced
-
Introduction
-
What you should know1m 25s
-
About the exam1m 48s
-
1. Network and Security Components
-
Network design1m 49s
-
Switches4m 1s
-
Routers1m 41s
-
Proxy2m 3s
-
Firewalls3m 30s
-
Firewall architecture3m 45s
-
Wireless controllers1m 45s
-
Remote access4m 14s
-
Transport encryption3m 28s
-
Mesh networks1m 44s
-
NIDS and NIPS3m 53s
-
SIEM2m 2s
-
Vulnerability scanners2m 1s
-
Database activity monitors2m 11s
-
-
2. Security Solutions in the Architecture
-
ACLs and rule sets2m 18s
-
Change monitoring2m 37s
-
Availability controls5m 22s
-
RAIDS and SANs3m 31s
-
Software-defined networking2m 22s
-
Cloud-managed networks3m 42s
-
Trunking security2m 19s
-
Port security2m 5s
-
Route protection1m 34s
-
DDoS protection2m 45s
-
Security zones4m 2s
-
Network access control2m 43s
-
Network-enabled devices5m 11s
-
Critical infrastructure2m 53s
-
3. Securing Host Devices
-
Securing host devices1m 26s
-
Trusted operating system2m 47s
-
Anti-malware2m 30s
-
Host-based firewall1m 46s
-
HIDS and HIPS59s
-
Data loss prevention2m 16s
-
Log monitoring3m 18s
-
Endpoint detection response1m 18s
-
Patch management2m 12s
-
Baselining configuration1m 36s
-
Group policies2m 23s
-
Command line restrictions1m 48s
-
Restricting peripherals3m 31s
-
Boot loader protections4m 21s
-
Cloud-augmented security2m 50s
-
-
4. Securing Mobile and Small Form Factor Devices
-
BYOD vs. COPE3m 40s
-
Over-the-air updates1m 7s
-
Remote assistance1m 25s
-
Remote access1m 14s
-
Authentication2m 49s
-
Privacy concerns1m 41s
-
Mobile payment1m 58s
-
Tethering1m 33s
-
Wearable technology2m 42s
-
5. Software Vulnerabilities
-
Application specific issues5m 57s
-
Conclusion
-
Next steps2m 17s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Trusted operating system