Application Isolation Containment

Abstract: Given that writing fully secure code remains an elusive goal, other techniques such as isolating processes to limit the adverse effect of a compromise are promising. This talk will summarize some of the techniques, both integrated into the operating system and available as third party add-ons, to provide this isolation.

Date Published:

Last Reviewed: 20 October 2016

Dissemination Control: N/A

Length: 17 page(s)

Format: pdf

Type: Reference/Overview; Presentation

Tags: IAS 2016; Information Assurance Symposium - IAS; Cybersecurity; Network Security; Information Technology - IT; Intrusion