security in computing

Upload: prateekmandi

Post on 08-Oct-2015

18 views

Category:

Documents


0 download

DESCRIPTION

related to computer security

TRANSCRIPT

  • 5/19/2018 security in computing

    1/19Figure 3-1 Places Where a Buffer Can Overflow.

  • 5/19/2018 security in computing

    2/19

    Figure 3-2 Data Structure for File Access.

  • 5/19/2018 security in computing

    3/19

    Figure 3-3 Modified Data.

  • 5/19/2018 security in computing

    4/19

    Figure 3-4 Virus Appended to a Program.

  • 5/19/2018 security in computing

    5/19

    Figure 3-5 Virus Surrounding a Program.

  • 5/19/2018 security in computing

    6/19

    Figure 3-6 Virus Integrated into a Program.

  • 5/19/2018 security in computing

    7/19

    Figure 3-7 Virus Completely Replacing a Program.

  • 5/19/2018 security in computing

    8/19

    Figure 3-8 Boot Sector Virus Relocating Code.

  • 5/19/2018 security in computing

    9/19

    Figure 3-9 Recognizable Patterns in Viruses.

  • 5/19/2018 security in computing

    10/19

    Figure 3-10 Stubs and Drivers.

  • 5/19/2018 security in computing

    11/19

    Figure 3-11 Covert Channel Leaking Information.

  • 5/19/2018 security in computing

    12/19

    Figure 3-12 Covert Channels.

  • 5/19/2018 security in computing

    13/19

    Figure 3-13 File Lock Covert Channel.

  • 5/19/2018 security in computing

    14/19

    Figure 3-14 File Existence Channel Used to Signal 100.

  • 5/19/2018 security in computing

    15/19

    Figure 3-15 Covert Timing Channel.

  • 5/19/2018 security in computing

    16/19

    Figure 3-16 Modularity.

  • 5/19/2018 security in computing

    17/19

    Figure 3-17 Coupling.

  • 5/19/2018 security in computing

    18/19

    Figure 3-18 Information Hiding.

  • 5/19/2018 security in computing

    19/19

    Figure 3-19 Fault Discovery RateReported at Hewlett-Packard.