Project #68317 - 6 Jave Applet Discussion Questions

Answer the 6 questions below

 

MAX BUDGET $80

 

(This was the original Question… Do not Answer) What are three ways Java applets enhance network security? Describe how each is used and how it affects security.

 

#1)  Respond to Michelle’s answer to the questions above. 

 

Applets are classified either as trusted or untrusted, and from there are either allowed or denied. By assigning the applets as either trusted or not, you can control which ones are allowed in the network or limit the ones you do not deem as safe. Since many browsers automatically deem a Java applet as a menace and automatically stop it from loading. Allowing the "safe" applets in is done by amending the default mode in the browsers from the original host and resetting the property settings, changing their cache to add the applet to the trusted signer certificates. What makes this safe is that there is no built-in automatic release for the potentially harmful applets, it is at the user's discretion as to which applets to allow or disallow.

When using the applet's keytool options, you can access many additional security enhancing functions. Some of these are, making a key pair, public or private, altering passwords and protecting any aliases.

 Jarsigner is a another security enhancing function, as it makes it much more difficult for unauthorized users to access a file, and gain privileges. This program asks for correlating passwords to open a certificate chain specified from keytool. Finally, it is the policytool that dictates the configuration of the external policy, this means the installer has the means to block who can view a page.

 

#2)  Respond to the statement made by the instructor’s statement to Michelle’s answer above in #1

 

The idea of a sandbox started in the first release of Java.  Trusted, local code would have access to vital system resources; however, untrusted code from the Internet would have very limited access within a sandbox.  There would be no access to system resources such as file systems.

 

There is also the concept of signed applets.  Signed applets would be allowed outside the sandbox.

 

Recently, there was a major breech of this sandbox in some versions of Java.  The last I heard, this has been fixed if you choose the later Java releases.

 

#3)  Respond to Randy’s answer to the instructors statement in #2.  

 

I agree with what you are saying about Applets can be classified as either a trusted or untrusted which will either allow it to be allowed or denied. So according to what you are saying you can assign the applets to be trusted or not trusted and this will allow you to control which ones are allowed in the network or at least limit the ones that you can do because it deems safe. I never really heard of Jarsigner but will be looking more in to it as I progress in my learning.

 

#4)  Respond to a statement the instructor made to Randy’s answer in #3.  

 

Java has really gotten strict about running applets and files.  I found this out last night trying to run an applet.  It used to be you could set the security to Medium, and the applets could be run.  With the latest releases of Java, you need to create an exception for each .html file you want to run in the Java Control Panel.

 

The Java Control Panel icon exists in different places for different operating systems, but you can always find it in the bin directory of your  JRE installation.  Or do a search for file javacpl.exe.

 

#5)  Answer the instructor statement made here: 

 

I'm not sure everyone still understands applets.  What are some of the difference between applets and applications?  What does the Graphics2D object do?

 

#6) Respond to Larry’s answer to the instructor’s statement made in #5.  

 

Janet from some of the reading  I have done is  the difference between applets and applications is an applet runs under the control of a browser, whereas an application runs standalone, with the support of a virtual machine. As such, an applet is subjected to more stringent security restrictions in terms of file and network access, whereas an application can have free reign over these resources.

 

 

 

 

Subject Computer
Due By (Pacific Time) 04/26/2015 10:00 pm
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy