CONTROLLING A COMPUTER |
CHAPTER 2 |
ABOUT THIS CHAPTER
This chapter introduces fundamental mechanisms for controlling a computer’s operation, and it further develops the process of solving security problems. The chapter focuses on the following topics:
• Overview of the general strategies for controlling access
• “Buffer overflow”: a well-known technique for subverting computer software
• Introduction to attack scenarios and case studies
• Mechanisms typically used to control access within a computer
• Security planning: describing the protections needed and how to implement them
2.1 Computers and Programs
When Alice, the owner of Alice’s Arts, writes a letter on her laptop, she runs a word-processing program. When doing calculations, ...
Get Elementary Information Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.