CHAPTER        2


This chapter introduces fundamental mechanisms for controlling a computer’s operation, and further develops the process of solving security problems. The chapter focuses on the following topics:

•  An overview of the general strategies for controlling access

•  “Buffer overflow”: a well-known technique for subverting computer software

•  The mechanisms typically used to control access within a computer

•  Security planning: describing the protections needed and how to implement them

2.1 Computers and Programs

When writing a paper, we run a word-processing program. When doing calculations, we use a spreadsheet. When searching for information on the Web, we use a browser. We choose ...

Get Elementary Information Security now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.