Rings of Processor Privilege Levels

Modern day computer and CPU architecture provides support to implement security to data from any code access. This is done by segregating trusted and not-trusted code. Trusted code has direct access to IO ports, memory, CPU and special instructions. Non-trusted code cannot directly access system resources. They need to make use of the exposed APIs … Continue reading Rings of Processor Privilege Levels