Professional Documents
Culture Documents
Essay Felipin
Essay Felipin
Today we will talk about the Java language, more specifically, the security that java presents. This will help us to have the basis to create codes secure enough, and make them more difficult to attack. Like we have seen in the semester, java is a very complete and compatible language, and if we add security to this, this language will be almost perfect.
Body
Javas security has a couple of utilities, like the access modifiers: public, private, default, protected; the final keyword, to declare constants; the serialization function, to access to private variables, transient to restrict access to private variables which use the serialization function, and more. But in order to accomplish those security rules, and be sure the syntax its all right, we need the help of three tools: The compiler The bytecode verifier The runtime machine
The compiler
Is the first tool used to make sure the code meets all the security rules, the compiler is responsible for all the rules we talk above, except for two: the compiler cannot enforce array bound checking nor can it enforce all cases of illegal object casts.
Conclusion
As we can see, the security inside Java is pretty sophisticate, its needed the help of the compiler and the runtime machine to make sure everything it is okay. But besides everything we have seen here, we need to understand that it doesnt ends here, and it is also needed the help of the programmer in order to write secure software, which, at least years ago, it didnt matters too much. Things have change, and so we will.