MIT 6.858 Computer Systems Security, Fall 2014 1. Introduction, Threat Models
1. Introduction, Threat Models Transcript and Lesson Notes
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing cl
Quick Summary
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing cl
Key Takeaways
- Review the core idea: MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing cl
- Understand how class introduction fits into 1. Introduction, Threat Models.
- Understand how threat model fits into 1. Introduction, Threat Models.
- Understand how perfect security fits into 1. Introduction, Threat Models.
- Understand how security policy fits into 1. Introduction, Threat Models.
Key Concepts
Full Transcript
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing class organization and the concept of threat models. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Lesson FAQs
What is 1. Introduction, Threat Models about?
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing cl
What key concepts are covered in this lesson?
The lesson covers class introduction, threat model, perfect security, security policy.
What should I learn before 1. Introduction, Threat Models?
Review the previous lessons in MIT 6.858 Computer Systems Security, Fall 2014, then use the transcript and key concepts on this page to fill any gaps.
How can I practice after this lesson?
Practice by applying the main concepts: class introduction, threat model, perfect security, security policy.
Does this lesson include a transcript?
Yes. The full transcript is visible on this page in indexable HTML sections.
Is this lesson free?
Yes. CourseHive lessons and courses are available to learn online for free.
