Computer Systems Security: Winter 2018 Assignment 4: Difference between revisions
Created page with "'''This assignment is not yet finalized.''' Due: April 9, 2018, 10 AM # [2] When code runs in a "sandboxed environment" does this refer to a specific security technology? E..." |
No edit summary |
||
Line 5: | Line 5: | ||
# [2] When code runs in a "sandboxed environment" does this refer to a specific security technology? Explain briefly. | # [2] When code runs in a "sandboxed environment" does this refer to a specific security technology? Explain briefly. | ||
# [4] Define whitelists, blacklists, anomaly detection, and virtualization. Explain how they are four fundamental strategies in computer security. | # [4] Define whitelists, blacklists, anomaly detection, and virtualization. Explain how they are four fundamental strategies in computer security. | ||
# [2] Why is it harder to implement protection boundaries within a process, as compared to having an operating system implement protection boundaries? Explain. |
Revision as of 04:43, 29 March 2018
This assignment is not yet finalized.
Due: April 9, 2018, 10 AM
- [2] When code runs in a "sandboxed environment" does this refer to a specific security technology? Explain briefly.
- [4] Define whitelists, blacklists, anomaly detection, and virtualization. Explain how they are four fundamental strategies in computer security.
- [2] Why is it harder to implement protection boundaries within a process, as compared to having an operating system implement protection boundaries? Explain.