The Need for Code Access Security

Back in the old days, before the Internet was mainstream, a user or administrator typically installed all software into fixed locations on desktop machines, servers, and local network shares. Most organizations with significant investments at stake made certain that the administrator understood the relevant security issues. Corporate security standards, auditing procedures, disaster recovery planning, as well as end-user training helped reduce the risk further. Even in that relatively closed and controlled environment, there were a few notable security risks. On the desktop the threats came mainly in the form of boot sector viruses, executable file viruses, and trojan horses. These nasty executables spread primarily ...

Get .NET Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.