Key concepts in this chapter are:
Handling security-related code-access violations
Running applications in different security zones
Modifying code to work within the bounds of different security zones
Using isolated storage in place of traditional file I/O
What is code-access security—or CAS, as it’s affectionately called? Code-access security is designed to protect applications and components in shared environments—such as your local network or the Internet—from the following risks:
Inadvertently or intentionally damaging or destroying sensitive data
Crippling the computer on which the code is running by consuming all available resources, such as all available memory or disk space—an event known as a denial of service ...