next up previous
Next: Java's Approach Up: The Problem Previous: What Needs Restrictions?

Scenarios



This section gives a few examples of scenarios that show what types of attacks from malicious programs can occur. The classifications of attacks will be the same as those mentioned in Section 2.1. Of course, this list of potential attacks is not intended to be complete, but rather give a flavor of the types of problems that can arise.




Thu Dec 7 18:26:21 EST 1995