This chapter discusses controlling access to computers through various mechanisms. It introduces buffer overflow attacks and describes how the Morris Worm in 1988 exploited a buffer overflow vulnerability to spread rapidly and disable many internet computers. It then explains the basic strategies that operating systems use to control access, including process isolation, access controls, and separating programs into user and kernel modes.