Top Banner

of 19

security in computing

Oct 08, 2015

Download

Documents

PrateekMandi

related to computer security
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 5/19/2018 security in computing

    1/19Figure 3-1 Places Where a Buffer Can Overflow.

  • 5/19/2018 security in computing

    2/19

    Figure 3-2 Data Structure for File Access.

  • 5/19/2018 security in computing

    3/19

    Figure 3-3 Modified Data.

  • 5/19/2018 security in computing

    4/19

    Figure 3-4 Virus Appended to a Program.

  • 5/19/2018 security in computing

    5/19

    Figure 3-5 Virus Surrounding a Program.

  • 5/19/2018 security in computing

    6/19

    Figure 3-6 Virus Integrated into a Program.

  • 5/19/2018 security in computing

    7/19

    Figure 3-7 Virus Completely Replacing a Program.

  • 5/19/2018 security in computing

    8/19

    Figure 3-8 Boot Sector Virus Relocating Code.

  • 5/19/2018 security in computing

    9/19

    Figure 3-9 Recognizable Patterns in Viruses.

  • 5/19/2018 security in computing

    10/19

    Figure 3-10 Stubs and Drivers.

  • 5/19/2018 security in computing

    11/19

    Figure 3-11 Covert Channel Leaking Information.

  • 5/19/2018 security in computing

    12/19

    Figure 3-12 Covert Channels.

  • 5/19/2018 security in computing

    13/19

    Figure 3-13 File Lock Covert Channel.

  • 5/19/2018 security in computing

    14/19

    Figure 3-14 File Existence Channel Used to Signal 100.

  • 5/19/2018 security in computing

    15/19

    Figure 3-15 Covert Timing Channel.

  • 5/19/2018 security in computing

    16/19

    Figure 3-16 Modularity.

  • 5/19/2018 security in computing

    17/19

    Figure 3-17 Coupling.

  • 5/19/2018 security in computing

    18/19

    Figure 3-18 Information Hiding.

  • 5/19/2018 security in computing

    19/19

    Figure 3-19 Fault Discovery RateReported at Hewlett-Packard.