Professional Documents
Culture Documents
IPT 102 Module 2
IPT 102 Module 2
Introduction
This module will discuss Evidence-based security vs. code access security, best
security coding practices, oAuthentication to system resources and services and
Encryption of data between systems and services in different phase of programming.
Lesson 1
Evidence-based security vs. code access security
I. Learning Outcomes
How does the Common Language Runtime (CLR) decide which permissions to
grant and which to deny? Code access security is also known by another name:
evidence-based security. The CLR examines the evidence associated with the
code to determine which security policy group the code belongs to. The CLR then
checks what permission set is associated with that code group. (Permission sets
and code groups are described later in this article.) If the code group has the
permissions demanded, the request is granted; if not, an exception is thrown.
Evidence
To understand security policy, you first have to understand what evidence is. As
mentioned earlier, evidence is used to authenticate the code. As such there are
several identity permissions that are used to identify code:
You can examine the evidence associated with an assembly. The evidence
collection associated with an assembly can be obtained from the evidence
enumerator.
Although they derive from CodeAccessPermission, these are not code access permission classes.
Evidence is extensible. You can define your own types of evidence.
Code identity permissions are used to define a security policy code group. For
example, all code whose ZoneIdentityPermission is MyComputer belongs to the
predefined MyComputerZone code group. A permission set is a named set of
permissions that can be associated with a code group. Administrators specify
which code groups and permission sets are defined for their system. By
determining which code group an assembly belongs to, the CLR can determine
which permissions are allowed or denied to an assembly. More than one code
group can be associated with a permission set.
Internet: The default policy permission set suitable for content of unknown
origin.
Activity 1
Instruction: Write your answer in a one whole sheet of yellow paper. Write
your name and subject description at the above.
Guide Question
1. What is the important of putting a security and setting some permission in
some program, system or application?
IV. References
https://www.techopedia.com/definition/25169/code-access-security,
https://www.informit.com/articles/article.aspx?p=25356&seqNum=5