Use your computer fearlessly.

Mission Services Articles Research

technical: software

Securing Applications

by Brent Kirkpatrick

(Date Published: .)

Secure infrastructure, sandboxing, access permissions, and resource allocation help contain insecure applications.

Hackers target insecure applications. With a little foresight, an IT team can properly sandbox insecure applications, limit their communications, and contain the damage they can do.

Securing the network infrastructure is a necessary first step. This is done by using secure routers and servers in your infrastructure.

cartoon: truck and laptops

Securing the operating system is the second step. An insecure application needs its own user with very restricted permissions. The communications should be limited, with very tight firewall settings for that user and application. Additionally, by restricting and monitoring resource usage (memory, disk, and network), the application is further sandboxed.

These two steps contain the damage that applications can do. While the application may still become compromised, the hackers who obtain access will be limited to the sandbox.

defendIT (TM). AI-driven security measures derived from security incident data.

What Is New? | Contact | Tips

© 2015-2021 Intrepid Net Computing. All rights reserved.