CONTROLLING A COMPUTER

CHAPTER        2

ABOUT THIS CHAPTER

This chapter introduces fundamental mechanisms for controlling a computer’s operation, and further develops the process of solving security problems. The chapter focuses on the following topics:

•  An overview of the general strategies for controlling access

•  “Buffer overflow”: a well-known technique for subverting computer software

•  The mechanisms typically used to control access within a computer

•  Security planning: describing the protections needed and how to implement them

2.1 Computers and Programs

When writing a paper, we run a word-processing program. When doing calculations, we use a spreadsheet. When searching for information on the Web, we use a browser. We choose ...

Get Elementary Information Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.