0% found this document useful (0 votes)
30 views

CTU 08101 Security Architecture

This document outlines the modules and assignments for a course on security architecture. The five modules cover: 1) secure system design concepts and security domains; 2) secure hardware architecture including components like the CPU and memory; 3) secure operating systems and software architecture like permissions and virtualization; 4) system vulnerabilities and countermeasures such as buffer overflows and web application attacks; and 5) network security including firewalls, encryption, and application layer security. Students are assigned topics related to each module, such as open vs closed systems, CIA triange, and layer 3 security.

Uploaded by

Shaban Mahekula
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

CTU 08101 Security Architecture

This document outlines the modules and assignments for a course on security architecture. The five modules cover: 1) secure system design concepts and security domains; 2) secure hardware architecture including components like the CPU and memory; 3) secure operating systems and software architecture like permissions and virtualization; 4) system vulnerabilities and countermeasures such as buffer overflows and web application attacks; and 5) network security including firewalls, encryption, and application layer security. Students are assigned topics related to each module, such as open vs closed systems, CIA triange, and layer 3 security.

Uploaded by

Shaban Mahekula
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Bachelor Degree in Information Security

CTU 08101 Security Architecture

Module 1: Security Architecture Introduction

 Secure System design concept


o Layering
o Abstraction
 Security Domains
 The Ring Model
 Open and Closed Systems

Module 2: Secure Hardware Architecture

 System Unit and Motherboard


 Computer Bus
o Northbridge
o Southebridge
 The CPU
o Arithmetic Logic Unit
o Multitasking and Multiprocessing
 Memory
o Memory Protection
o Virtual Memory
o Firmware

Module 3: Secure OS and Software Architecture

 The Kernel
 Users and File Permissions
o Linux and Unix Permissions
o Microsoft NTFS Permissions
o Privileged Programs
 Virtualization
 Thin Clients

CTU 08101 Security Architecture Page |1


Module 4: System Vulnerabilities, and Countermeasure

 Covert Channel
 Buffer Overflows
 Backdoors
 Malicious Code
 Web Application Attacks
 Mobile device attack
 Database Security

Module 5: Network Security

 Firewall and its Working


 Security on Physical Layer
 Security on Data Link Layer
 Security on Network Layer
 Application layer Security

CTU 08101 Security Architecture Page |2


Assignments

S/N Topic Action Required


Assignment 1 What is Open and Closed Models
Assignment 2 Explain CIA Triangle
Assignment 3 How to use Virtual memory to improve the To be submitted for
performance of the system evaluation
Assignment 4 What type of tools are used in application
layer security
Assignment 5 Describe NTFS Security
Assignment 6 Feature of latest VMware Workstation
Assignment 7 How to prevent SQL Injection attack
Assignment 8 What is Buffer Overflows
Assignment 9 How to implement Layer 3 Security To be submitted for
evaluation
Assignment Devices used to detect and prevent intrusion
10 in the network

CTU 08101 Security Architecture Page |3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy