Presentation is loading. Please wait.

Presentation is loading. Please wait.

Controlling A Computer

Similar presentations


Presentation on theme: "Controlling A Computer"— Presentation transcript:

1 Controlling A Computer
Chapter 2 Controlling A Computer

2 FIGURE 2.0.F01: The working insides of a computer.
© iStockphoto/Thinkstock © Péter Gudella/Dreamstime.com Courtesy of Dr. Richard Smith

3 FIGURE 2.0.F02: Older and newer ATA cables.
Courtesy of Dr. Richard Smith

4 FIGURE 2.0.F03: Executing a machine instruction in a computer.
Courtesy of Dr. Richard Smith, © iStockphoto/Thinkstock

5 FIGURE 2.0.F04: Separate control and data sections.

6 FIGURE 2.0.F05: Running two processes at once.
Used with permission from Microsoft.

7 FIGURE 2.0.F06: A partial list of processes displayed by the Unix ps command.
Courtesy of Dr. Richard Smith

8 FIGURE 2.0.F07: Data section for the finger service.

9 FIGURE 2.0.F08: Attacking a computer via the finger process.

10 FIGURE 2.0.F09: Buffer overflow in the finger service.

11 FIGURE 2.0.F10: Example of steganography.

12 FIGURE 2.0.F11: Two processes sharing a control section.

13 TABLE 2.0.T01: Access matrix for processes in Figure 2.11

14 FIGURE 2.0.F12: Two processes (a program and a device driver) share a data section.

15 TABLE 2.0.T02: Access matrix for Figure 2.12

16 FIGURE 2.0.F13: Categories of security controls.

17 TABLE 2.0.T03: Alice’s security controls

18 TABLE 2.0.T04: Security requirements for process protection

19 TABLE 2.0.T05: Security controls for process protection


Download ppt "Controlling A Computer"

Similar presentations


Ads by Google