FIGURE 9.1 In the commonly used four-ring model, protection rings segregate the operating system into kernel, components, and drivers