This chapter introduces fundamental mechanisms for controlling a computer’s operation, and it further develops the process of solving security problems. The chapter focuses on the following topics:
■ Overview of the general strategies for controlling access
■ Buffer overflow: a well-known technique for subverting computer software
■ Introduction to attack scenarios and case studies
■ Mechanisms typically used to control access within a computer
■ Security planning: describing the protections needed and how to implement them