Untrusted

Untrusted

The term, "untrusted" is used exclusively in the field of computer science and information security to denote code from an unknown source that "may" be potentially harmful to a system. It is distinguished from "untrustworthy" or "distrusted" in that the code may be useful and completely benign, whereas the terms "untrustworthy" and "distrusted" suggest something about the subject (whether it is a person or thing) that suggests that the person or thing is not to be trusted. For example, an "untrustworthy person" suggests a person who has lied or cheated in the past, suggesting a propensity to lie or cheat in the future. A "distrusted person" suggests a person for whom a determination has been made that the person is not to be trusted. An "untrusted" code however, is simply code that has not met predefined requirements to be trusted, e.g., completed an authentication protocol to verify that it came from a trusted source.

In the field of information security, no opinion is necessarily made of untrusted software, which is generally permitted to run on a computer system, but with some protections. For example, the software may be executed in a sandbox.

In the field of telecommunication, random bit errors are quite common.Therefore, a packet of information is usually isolated in a (untrusted) buffer until the redundancy check shows it is free from errors.

In the field of cryptography, BAN logic assumes that all information exchanges happen on mediums vulnerable to tampering and public monitoring.This has evolved into the popular security mantra, "Don't trust the network."Therefore, messages are usually considered untrusted until the message authentication code shows it is free from tampering.


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • untrusted — adj. * * * …   Universalium

  • untrusted — adjective Not trusted …   Wiktionary

  • untrusted — adj …   Useful english dictionary

  • Multilevel security — or Multiple Levels of Security (abbreviated as MLS) is the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security… …   Wikipedia

  • XTS-400 — Infobox OS name = XTS 400 website = [http://www.baesystems.com/ProductsServices/bae prod csit xts400.html www.baesystems.com] developer = BAE Systems source model = Closed source latest release version = 6.5 latest release date = August 2008… …   Wikipedia

  • System Architecture Evolution — (aka SAE) is the core network architecture of 3GPP s LTE wireless communication standard. SAE is the evolution of the GPRS Core Network, with some differences: simplified architecture all IP Network (AIPN) support for higher throughput and lower… …   Wikipedia

  • Cross-site scripting — (XSS) is a type of computer security vulnerability typically found in Web applications that enables attackers to inject client side script into Web pages viewed by other users. A cross site scripting vulnerability may be used by attackers to… …   Wikipedia

  • NoScript — For the <noscript> HTML element, see HTML element#Other block elements. NoScript Developer(s) Giorgio Maone Stable release 2.1.8 / October 28, 2011; 10 days ago …   Wikipedia

  • Sandbox (computer security) — This article is about the computer security mechanism. For the Wikipedia feature, where newcomers can experiment with editing or established editors can experiment with new features, see . : For the software testing practice, see sandbox… …   Wikipedia

  • Dual-homed — In firewall technology, dual homed is one of the firewall architectures for implementing preventive security. It provides the first line defense and protection technology for keeping untrusted bodies from compromising information security by… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”