Computer Science 440 Spring 2014
Gregory M. Kapfhammer
Keep in touch!

Office Hours, Email, Web, Twitter

Operating Systems
Security
Confidentiality
Data Integrity
System Availability
Privacy
Attacks?
Responses?
Plain Text
Cipher Text
Security by Obscurity
Kerckhoff's Principle
Algorithm is public
Key(s) are secret
Trusted Platform Module
TPM
Cryptoprocessor
NVRAM with Keys
Linux Security
Trade-offs?