CHAPTER
8 Countermeasures: Security Controls
Overview
• 8.1 Countermeasures: Design to Purpose
• 8.2 Ensure Attack-Space Coverage (Defense in Breadth)
• 8.3 Defense in Depth and Breadth
• 8.4 Multilevel Security, Trusted Code, Security Kernels
• 8.4.3 Security Kernel and the Reference Monitor
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.