Affordable Access

Computer Security—An End State?

Authors
Publication Date
Keywords
  • Computer Science

Abstract

Over the last several years, popular applications such as Microsoft Internet Explorer and Netscape Navigator have become prime targets of attacks. These applications are targeted because their function is to process unauthenticated network data that often carry active content. The processing is done either by helper applications, or by the web browser itself. In both cases the software is often too complex to be bug free. To make matters worse, the underlying operating system can do very little to protect the users against such attacks since the software is running with the user's privileges.

There are no comments yet on this publication. Be the first to share your thoughts.

Statistics

Seen <100 times
0 Comments

More articles like this

The state-of-the-art in computer security

on Computers & Security Jan 01, 1983

Computer security: Observations on the state of th...

on Computers & Security Jan 01, 1983

Computer security

on Computer Law & Security Review Jan 01, 1989
More articles like this..