|
Conclusion
With the easy distribution mechanisms provided by the World Wide Web and intranets, this makes Java a powerful tool for many network based systems. The mobile applications which Java enables solves many persistent problems in application distribution and systems management. Java does open up a lot of security. Java uses the sandbox model to restrict security breaches. This model gives users the advantage of easy, ad-hoc application distribution while it protects them from potentially malicious applications. Several efforts have occurred to further enhance Java and its security. Releases of Java have provided applet signing, support for flexible policies, encryption and auditing.Any organization which is considering adding Java applications or Java enabled software to its network should carefully consider how Java will affect their security policies. There is no guarantee that all risks can be eliminated from a networked environment. By understanding how Java's security model works and what sorts of attacks are possible, keeping up-to-date with new situations and occurrences, and evaluating Java through the eyes of the organization's overall security policy can reduce risks to an acceptable level.
DS420 Project |
Home Digital Certificates Firewalls Cryptography SSL JAVA |