COSC 4765 - HW 4 - N e e r a P r a d h a n | 1 COSC 4765...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: N e e r a P r a d h a n | 1 COSC 4765 Homework 4 Neera Pradhan 1. Explain what the following statement means, “Security by obscurity”. What is the purpose of Obfuscation Techniques? “Security by obscurity” means to use secrecy to provide security. Usage of passwords is the technique used in this method of security. Obfuscation techniques are used in order to make the code difficult to understand for violators and raise the security level higher than was before. 2. [10 points] Why Input Validation is so important? Explain some security problems that rise out of lack of input validation. 3. What is a buffer Overflow? Why is it so common? Buffer overflow is writing of data beyond the allocated buffer/memory location, which causes data to be over written in the adjacent memory, thus corrupting the data values in it. This can be a serious problems as malicious code can be injected and execute the it....
View Full Document

This note was uploaded on 02/23/2011 for the course CHEM 1030 taught by Professor Staff during the Spring '08 term at Univeristy of Wyoming- Laramie.

Page1 / 3

COSC 4765 - HW 4 - N e e r a P r a d h a n | 1 COSC 4765...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online