Module 22: Multi-core Computing Security
  Lecture 43: Multiprocessor Techniques
 


Enforcement Media

  • The channel through which the information or a resource access is granted.
    • OS for example.
  • Sometimes the media may not be trustworthy (for example the network)
    • In the security policies and mechanism this aspect has to be taken care of.

Threat and Attack

  • Threat is a potential violation of security
  • Attack is actual violation.
  • Leakage of information
  • Modification of message while in transit
  • Loss of information
  • Proxy
  • Active and passive attacks