Principle of least privilege

Results: 122



#Item
101Computer security / Linux / Linux kernel / Loadable kernel module / Kernel / Ring / Security kernel / Principle of least privilege / Computer architecture / Computing / Software

DNS and Multilevel Secure Networks

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2008-06-12 12:08:58
102Cyberwarfare / CapDesk / Principle of least privilege / Vulnerability / Firewall / JavaScript / Computer network security / Computer security / Computing

BAA[removed]SNK BY FOCUSED RESEARCH TOPIC 5 MARC STIEGLER AND MARK MILLER

Add to Reading List

Source URL: combex.com

Language: English - Date: 2005-08-18 16:57:04
103Authorization / Access control / Information security / Principle of least privilege / Federal Deposit Insurance Corporation / Computer security / Security / Public safety

Circular[removed], Access Control for Information Technology Resources

Add to Reading List

Source URL: www.fdic.gov

Language: English - Date: 2013-08-26 10:01:00
104Principle of least privilege / Superuser / Privilege / Computing / Computer security / System administration / Information theory

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2013-01-16 08:38:55
105Data security / Identity management / Authorization / California State University /  Northridge / Authentication / Principle of least privilege / Separation of duties / Password / Security / Computer security / Access control

POLICIES & PROCEDURES Access Control Policy[removed]Revision Date: [removed]POLICY PURPOSE: This policy provides direction and support for managing access to CSUN information assets and guidance for: granting

Add to Reading List

Source URL: www.csun.edu

Language: English - Date: 2014-03-07 15:38:35
106System administration / Unix / Password / Pass the hash / Privilege / Superuser / Access token / Principle of least privilege / QVD / Computer security / Microsoft Windows / System software

Control Administrative Privileges Administrative privileges on a computer system allow access to resources that are unavailable to most users and permit the execution of actions that would otherwise be restricted. When s

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-03-13 11:45:53
107System software / User identifier / Group identifier / Setuid / Filesystem permissions / Principle of least privilege / Privilege separation / Linux kernel / System call / Unix / Software / Computing

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-10-18 17:59:35
108Data security / Cyberwarfare / Identity management / Information technology controls / privacy / Access control / Security controls / Principle of least privilege / Internal audit / Computer security / Security / Auditing

Microsoft Word[removed]docx

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2010-06-30 07:17:39
109Systrace / Computer security / Unix / Kernel / System call / Operating system / Principle of least privilege / Microkernel / Chroot / System software / Software / Computer architecture

Improving Host Security with System Call Policies Niels Provos Center for Information Technology Integration

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2003-08-09 19:06:41
110Human–computer interaction / User interface / Usability / End-user development / Trusted path / User / Principle of least privilege / User interface design / Customer relationship management / Human–computer interaction / Computing / Software

User Interaction Design for Secure Systems Ka-Ping Yee University of California, Berkeley

Add to Reading List

Source URL: zesty.ca

Language: English - Date: 2002-09-03 04:20:48
UPDATE