Question: Many security experts are concerned about Microsoft's ActiveX controls and how they can be used by attackers. In response, Microsoft has created a system that
Many security experts are concerned about Microsoft's ActiveX controls and how they can be used by attackers. In response, Microsoft has created a system that it claims will authenticate and verify the controls. Using the Web, research the debate over ActiveX controls and analyze Microsoft's security design. Is it strong enough? What security breaches have occurred in the past regarding ActiveX controls?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
