Purchase Solution

Limit creation of malicious code

Not what you're looking for?

Ask Custom Question

1. In order to limit the creation of malicious code, do you think that access to elements of the document object model and some Javascript functionality be limited? In discussing your answer, describe two types of computer attacks/ viruses that may be initiated by scripting code in the browser environment. What else can we do to combat this?

Purchase this Solution

Solution Summary

The expert examines limit creation of malicious code.

Solution Preview

Limit creation of malicious code
1. In order to limit the creation of malicious code, do you think that access to elements of the document object model and some Javascript functionality be limited? In discussing your answer, describe two types of computer attacks/ viruses that may be initiated by scripting code in the browser environment. What else can we do to combat this?

Solution

Malicious JavaScript Codes
Miscreants can code the JavaScript to do malicious works in your websites. For example, the recent Yamanner worm targeted Yahoo Mail which extracted the e-mail addresses, sent those off to the attacker, and forwarded itself to all contacts in a user's Yahoo address book. The Samy worm spread on MySpace which changes the user profiles in social-networking Web sites. Both worms were created in JavaScript.
JavaScript Code attack
After creating a malicious JavaScript, an attacker can look for a vulnerable Web site to host the script. Security experts say Web sites are widespread with cross-site scripting flaws. An attacker could use such a flaw to embed his ...

Purchase this Solution


Free BrainMass Quizzes
Java loops

This quiz checks your knowledge of for and while loops in Java. For and while loops are essential building blocks for all Java programs. Having a solid understanding of these constructs is critical for success in programming Java.

Inserting and deleting in a linked list

This quiz tests your understanding of how to insert and delete elements in a linked list. Understanding of the use of linked lists, and the related performance aspects, is an important fundamental skill of computer science data structures.

Word 2010: Table of Contents

Ever wondered where a Table of Contents in a Word document comes from? Maybe you need a refresher on the topic? This quiz will remind you of the keywords and options used when working with a T.O.C. in Word 2010.

Basic Networking Questions

This quiz consists of some basic networking questions.

Javscript Basics

Quiz on basics of javascript programming language.