Please enable JavaScript.
Coggle requires JavaScript to display documents.
3 - Security Architectures, Designs and Solution Elements - Coggle Diagram
3 - Security Architectures, Designs and Solution Elements
Processor
Execution types
Multitasking
A single-core multitasking system is able to juggle more than one task or process at any given time.
-
-
-
-
-
Protection mechanisms
Protection rings
-
The deeper inside the circle, the higher the privilege level associated with the code that occupies a specific ring
-
-
-
-
Memory
-
-
-
Memory Addressing
-
-
-
Indirect Addressing
The memory address supplied to the CPU contains another memory address which indicates where data is stored.
-
Secondary Memory
Data not directly available to the CPU (e.g. magnetic, optical or flash-based media or other storage devices)
-
-
-
Data Storage Devices
Primary vs. secondary
-
secondary = magnetic, optical, flash media, etc.
-
-
-
Emanation Security
Adversaries can intercept electromagnetic or radio frequency signals from devices and interpret them to extract confidential data
-
-
-