Building a trusted computing base
Sandboxing
16.
Restricting Code
17.
Malicious Code
18.
Viruses and Trojans
19.
The Sandbox Concept