Chapter 7 Trojan Horses and Covert Channels

    When people began thinking about making systems more secure, they naturally speculated about specific penetration techniques. At first, the approach to securing operating systems was directed toward closing the holes inadvertently left by designers. These holes typically allowed a penetra-tor to gain control of the operating system, or at least to bypass… CONTINUE READING