CONTROLLING A COMPUTER

CHAPTER

2

ABOUT THIS CHAPTER

This chapter introduces fundamental mechanisms for controlling a computer’s operation, and it further develops the process of solving security problems. The chapter focuses on the following topics:

  Overview of the general strategies for controlling access

  “Buffer overflow”: a well-known technique for subverting computer software

  Introduction to attack scenarios and case studies

  Mechanisms typically used to control access within a computer

  Security planning: describing the protections needed and how to implement them

2.1     Computers and Programs

When Alice, the owner of Alice’s Arts, writes a letter on her laptop, she runs a word-processing program. When doing calculations, ...

Get Elementary Information Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.