{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

COSC 4765 - HW 4 - Neera Pradhan |1 COSC 4765 Homework 4...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
N e e r a P r a d h a n | 1 COSC 4765 Homework 4 Neera Pradhan 1. Explain what the following statement means, “Security by obscurity”. What is the  purpose of Obfuscation Techniques? “Security by obscurity” means to use secrecy to provide security. Usage of passwords is  the technique used in this method of security.  Obfuscation techniques are used in order to make the code difficult to understand for  violators and raise the security level higher than was before.   2. [10 points] Why Input Validation is so important? Explain some security problems  that rise out of lack of input validation. 3. What is a buffer Overflow? Why is it so common? Buffer overflow is writing of data beyond the allocated buffer/memory location, which  causes data to be over written in the adjacent memory, thus corrupting the data values in  it. This can be a serious problems as malicious code can be injected and execute the 
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}