Explain the core principles, patterns and mechanisms to build secure systems
Investigate the concept of trust anchors based on special hardware
Discuss ways to create secure OS kernels or at least to improve and harden existing ones.
Show how existing operating systems as a whole can be secured using sandbox-like concepts
Discuss administration security
Show the importance of type safe languages and VMs.
Show how critical servers can be secured on current operating systems
Explain improved server design for security
Investigate monolithic applications and their security problems using browsers etc. as example.
Finally, explain different concepts of access rights based on identity or data classification.
Explain the importance of usability issues e.g. for trusted path