This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: N e e r a P r a d h a n | 1 COSC 4765 Homework 4 Neera Pradhan 1. Explain what the following statement means, “Security by obscurity”. What is the purpose of Obfuscation Techniques? “Security by obscurity” means to use secrecy to provide security. Usage of passwords is the technique used in this method of security. Obfuscation techniques are used in order to make the code difficult to understand for violators and raise the security level higher than was before. 2. [10 points] Why Input Validation is so important? Explain some security problems that rise out of lack of input validation. 3. What is a buffer Overflow? Why is it so common? Buffer overflow is writing of data beyond the allocated buffer/memory location, which causes data to be over written in the adjacent memory, thus corrupting the data values in it. This can be a serious problems as malicious code can be injected and execute the it....
View Full Document
This note was uploaded on 02/23/2011 for the course CHEM 1030 taught by Professor Staff during the Spring '08 term at Univeristy of Wyoming- Laramie.
- Spring '08