Legitimate examples of mobile code include data validation on forms, basic processing, and customized Web pages. Mobile code is likewise used to run Java applets that enhance the Web ex
Mobile code provides too umteen benefits to be eliminated altogether from the Internet. Web surfing is more pleasurable and more efficient because of mobile code, and in most cases, mobile code does not cause damage to networks.
However, information engineering science professionals need to recognize that networks are vulnerable to attacks by poisonous mobile code, and need to take steps to prevent or mitigate attacks. Such activities require recognizing the risk that mobile code poses, and protections designed to protect against those risks.
Grimes, Roger. "Malicious Mobile Code." Software manhood 34(Jan 2003): 16.
erience for users. However, mobile code has gained increased publicity when it is used for despiteful attacks. These attacks may include viruses that disable a computer altogether, fifth column horses--programs that are run at a subsequently time to destroy data, modification of the security settings in order to return an opportunity for hackers to gain access at a later time, or sending sensitive information to a remote Web site (Piscitello 42).
"Websense Checks Mobile
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
No comments:
Post a Comment