1. Introduction, Threat Models


Author: MIT OpenCourseWare
147192 View
0m 0s Lenght
977 Rating


MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing class organization and the concept of threat models. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu


Comments

  1. Great lecture with good examples like i-cloud
  2. 21:32 you lost the kid LOL!
  3. Can you provide for reference sources citing the three folded security approach (policy, tm and mechanisms)? Regarding the threat model, is there a generally accepted methodology you could mention (preferably free from product bias) specifically advised for system protection endevors ?
  4. note to camera person. Don't need to zoom or follow. Just leave it pointed at the board full frame.
  5. thank you very much <3 .This videos are very knowledgefull ,it helped me a lot
  6. Microsoft is inherently a piece of crap insecure system, so it is some what ironic that there is a whole industry that focuses nearly entirely on playing 'wack the mole' every time some idiotic problem crops up that is mainly the result of an under lying problem known as microsoft.

    *nix does not suffer from any of microsofts problems that if I didnt know any better would say that are engineered in.
  7. I'm taking a similar class online. Very helpful.
  8. 21:40 20 minutes late to class, immortalized online
  9. Security can be modeled as the difficulty of creating a simulation of one's
    computations.
  10. you guys need to have an educational auditing service where students can submit papers and programs for grading and take proctored tests for credit. with the glut in the academic labor market and the sheer tonnage of hungry grad students you could farm the grading to the credentialed poor through something like Amazons Mechanical Turk. With all the syllabi, readings, open source systems and even lectures free on line there is no reason student's should have to mortgage themselves for an undergraduate degree. and by the same token there is no reason each class shouldn't have several million student's earning grades.
  11. Great examples professor
  12. Please, give us the lab.😢 This is very hard to implement without knowing how to do it.
  13. hey ! Thanks for the wonderful work. I was wondering if this course will be helpful to someone who is targeting to become security analyst?
  14. Is this course useful for someone who has not taken any sort of computer science course and has little/no experience in coding? Or is there another lecture series I should start with?
  15. dirty cow
  16. Which editor is being used to explain the buffer overflow exploit?
  17. Where can I learn about "Code signing" and "Sandboxing"?

    I've been searching for hours and don't seem to find one that tells me exactly how "Code signing" and "Sandboxing" works.
  18. For which age group is this lecture for?
  19. The guy in that video looks like the love child of Adam Sandler and jered the subway guy
  20. Are the course labs accessible for outside MIT students?. Anyone tried?