Page 101 - slides.dvi
P. 101

•
                                                                                                   •
                         •
                                                           •
                               •
                  In
             on
                                                                                             –
                                                                                   –
                                                                                        –
                                                                              –
                                                                  –
                                            –
                                                      –
                                     Also
                                                 –
   Operating
                                                                                                          Require
                                                           denial
                                                                  can
                         isolate
                               isolate
                                     wish
                                                                                                   release
             objects
                  general,
                                                                                   using
   Systems
                                                           of
                                                                              covert
                                                                                                   of
                                     to
                                                                                             reading
                               for
                         for
                                                      causing
                                                 causing
   —
                                                                  also
                                                                                                               Protection
                                                                                        violating
                                            changing
                                                      a
                                                                       modification
                                                                                             or
             (e.g.
                                                 high
                                                                       of
                                                                                                          protection
                                                           service
   Protection
                                     protect
             files
                                                      crash
                                                                              channels
                         damage
                                            access
                  protection
                                                                                        privacy
                                                                                   proprietary
                                                 load
                                                                                             leaking
             or
                               debugging
                                                                                                   information
                                                                  “sabotage”
                                                                                                          against
                                            rights
                                     against
                                                 (e.g.
                                                                                             data
                                                                  by
                         control
                                                                       information
                                                                                   software
             devices
                                     the
                                                                                        legislation
             or
                  mechanisms
                                                                  deleting
                                                 processes
                                     effects
             other
                                                                  or
                                                                                                          unauthorised:
                                                 or
                  impose
                                     of
                                                                  hiding
                                     errors:
                                                 packets)
                  controls
             processes).
                  on
                                                                  information
                  access
                  by
                  subjects
                  (e.g.
                  users)
   97
   96   97   98   99   100   101   102   103   104   105   106