O'Reilly logo

Network and Data Security for Non-Engineers by Stephan S. Jones, Kevin Groom, Frank M. Groom

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Creating Secure Code

First Principle of Code Protection: Code Isolation and Confinement

In today’s Internet-driven world, we often find ourselves running untrusted code on our devices. This code is contained in programs, applications, extensions, plug-ins, and codecs for media players, which we have become accustomed to naively trusting and downloading. However, malware creators take advantage of unknowing users who download or use infected code. Such infected code can be directed toward a variety of devices including our computers, tablets, and smartphones. Hackers may hide their malware code in any component where they see an opportunity to catch unaware users. Specialized codecs for media are examples of components that are frequently ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required