Mobile Code Essay Example
Discussion
A mobile code is software that is taken from remote systems, moved or transferred to a local system without permission or confirmation from the recipient. Information specialists find mobile codes a convenient way of enhancing the performance of networked computing systems (Cornell University, 2005). It can also be defined as executable content that is provided to users that visit websites or to automate certain tasks (Microsoft, 2008).
The most common types of mobile code are: Embedded Script, which usually has a built in interpreter to identify other scripts within web pages, ActiveX Controls which can make programming objects that can in turn trigger the services for other programs, Java Applets, which transfer the code into the receiving machine to run certain new programs, Built-in Objects, which are used to enhance scripting functions, and Visual Basic for Applications (VBA), which allows a certain application to operate within other applications without conflict (Microsoft, 2008).
The main security consideration when it comes to security code is the need to permit codes from unknown origins to operate on one's system with protection, and to improve trusted code such that this does not accidentally cause security problems. The basic tool is the promotion of code access security. This special software allows the system to give permission for the different resources in the system, to require the mobile code to request for permission from the system or user, puts in place digital signatures which the code will request for each layer of work or assembly, and in the end which will help the software officer to design new protocols or policies with regards to the entrance of mobile codes into the system (Microsoft, 2008).
Protection from mobile codes is necessary as sometimes "malicious mobile codes" enter one's operating system. Examples of this type of mobile codes are viruses, worms, trojans, and the like. The infamous I LOVE YOU virus attacked system via entrance into email messages, which means that the probability that these codes will get more mobile and find more ways of attacking systems is great, and hence the need for protection or security against them is even greater.
Comments
Post a Comment