Dangerous Access to Resources
Network: Forgery, impersonation
Cpu: Crash the browser, hang the machine
Disk: Delete files, substitute programs (spread viruses)
Display: Trick the user into giving away secrets
slide 4
Previous
Next
Daniel W. Connolly