Chapter 3. Program Security

In this chapter:

  • Programming errors with security implications—buffer overflows, incomplete access control

  • Malicious code—viruses, worms, Trojan horses

  • Program development controls against malicious code and vulnerabilities—software engineering principles and practices

  • Controls to protect against program flaws in execution—operating system support and administrative controls

In the first two chapters, we learned about the need for computer security and we studied encryption, a fundamental tool in implementing many kinds of security controls. In this chapter, we begin to study how to apply security in computing. We start with why we need security at the program level and how we can achieve it.

In one form or another, ...

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.