Please enable JavaScript.
Coggle requires JavaScript to display documents.
Operating Systems Security - Coggle Diagram
Operating Systems Security
Key quality
Recognizing damages
and attacks
Strategies to detect
attacks and evaluate damage
intruder detection
integrity check
Attacks resistance
To repel attacks
Authentication
Authentication
Access controls
encryption
message filtering
System Diversification
functional insulation
Recovering services after the attack
Strategies to limit damage, restore compromised information or functionality, maintain or restore special services while respecting mission time constraints, restore all
services.
Redundant Components
data replication
System backup and restore
contingency planning
Evolution to reduce efficiency
of future attacks
Strategies to improve system survivability based on insights gained from hacks
patterns
recognition and intromissions