Goals

  1. Explain the core principles, patterns and mechanisms to build secure systems

  2. Investigate the concept of trust anchors based on special hardware

  3. Discuss ways to create secure OS kernels or at least to improve and harden existing ones.

  4. Show how existing operating systems as a whole can be secured using sandbox-like concepts

  5. Discuss administration security

  6. Show the importance of type safe languages and VMs.

  7. Show how critical servers can be secured on current operating systems

  8. Explain improved server design for security

  9. Investigate monolithic applications and their security problems using browsers etc. as example.

  10. Finally, explain different concepts of access rights based on identity or data classification.

  11. Explain the importance of usability issues e.g. for trusted path