This document is a book about computer security for administrators and users of computer networks. It contains an introduction to computer security and operating systems. Some key points covered include definitions of hackers and operating systems, a brief history of operating systems, and an overview of security aspects of operating systems such as external security, internal security, processor security, memory security and file security. The document provides guidance on securing operating systems.
33. x ,QVWUXFFLRQHVPDQXDOHV
x 3pUGLGDGH7LHPSRHQFDPELRVGHWDUHDV
x $JLOL]DUHOSDVRGHXQWUDEDMRDRWUR
*HQHUDFLyQ x ³3URFHVDPLHQWRSRUORWHV´
34. x 8VXDULR GHEH UHIHULVWH DO GLVSRVLWLYR
HVSHFtILFRTXHHVWDXVDQGR
x $SOLFDGRV DVLVWHPDVJUDQGHV
x 0XOWLSURJUDPDFLyQ
*HQHUDFLyQ x 0XOWLSURFHVDPLHQWR
35. x 7UDEDMRLQGHSHQGLHQWHGHOGLVSRVLWLYRXVDGR
x 6LVWHPDV GH SURFHVDPLHQWR GH WLHPSR
FRPSDUWLGR
x 6LVWHPDVGHWLHPSRUHDO
+LVWRULDGHORV x (VSHFLDOHVSDUDWDUHDVJUDQGHV
6LVWHPDV *HQHUDFLyQ x 3UREOHPDVHQHOHODXPHQWRGHORVWLHPSRVGH
2SHUDWLYRV
36. HMHFXFLyQGHORVSURJUDPDV
x $SUHQGL]DMHHQJRUURVRGHOVLVWHPD
x (PSOHRGH5HGHVGHRUGHQDGRUHV
*HQHUDFLyQ x 3URFHVDPLHQWRHQOtQHD
37. x 3UREOHPDVGHVHJXULGDG
x 0iTXLQDVYLUWXDOHV
x %DVHVGH'DWRV
x ,QJHQLHUtDGH6LVWHPDVOyJLFRV
x ,QWHUFRQH[LyQ HQWUH GLIHUHQWHV UHGHV
*HQHUDFLyQ VHUYLFLRV,QWHUQHW