Download presentation
Presentation is loading. Please wait.
1
Controlling A Computer
Chapter 2 Controlling A Computer
2
FIGURE 2.0.F01: The working insides of a computer.
© iStockphoto/Thinkstock © Péter Gudella/Dreamstime.com Courtesy of Dr. Richard Smith
3
FIGURE 2.0.F02: Older and newer ATA cables.
Courtesy of Dr. Richard Smith
4
FIGURE 2.0.F03: Executing a machine instruction in a computer.
Courtesy of Dr. Richard Smith, © iStockphoto/Thinkstock
5
FIGURE 2.0.F04: Separate control and data sections.
6
FIGURE 2.0.F05: Running two processes at once.
Used with permission from Microsoft.
7
FIGURE 2.0.F06: A partial list of processes displayed by the Unix ps command.
Courtesy of Dr. Richard Smith
8
FIGURE 2.0.F07: Data section for the finger service.
9
FIGURE 2.0.F08: Attacking a computer via the finger process.
10
FIGURE 2.0.F09: Buffer overflow in the finger service.
11
FIGURE 2.0.F10: Example of steganography.
12
FIGURE 2.0.F11: Two processes sharing a control section.
13
TABLE 2.0.T01: Access matrix for processes in Figure 2.11
14
FIGURE 2.0.F12: Two processes (a program and a device driver) share a data section.
15
TABLE 2.0.T02: Access matrix for Figure 2.12
16
FIGURE 2.0.F13: Categories of security controls.
17
TABLE 2.0.T03: Alice’s security controls
18
TABLE 2.0.T04: Security requirements for process protection
19
TABLE 2.0.T05: Security controls for process protection
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.