A-Z Popular Blog Security Search »
Information Security
Related Guides

What is a Sandbox?

 , updated on
A sandbox is an environment for running programs that restricts them to virtual resources such as disk space, operating system APIs and memory. This may also allow access to real resources such as an internet connection.
The purpose of a sandbox is to prevent untrusted programs or resources from damaging a system or infecting it with malware. Programs inside the sandbox are typically unaware they're in a sandbox. They may attempt to make changes to critical files and resources but these changes only occur in the sandbox.
Overview: Sandbox
Defensive Computing
Information Security
A virtual environment that is used to isolate running programs from real resources such as files.
Properly implemented, a sandbox keeps programs contained in a virtual environment that prevents them from making real changes to systems.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Digital Identity
Failure Of Imagination
Incident Response
IoT Security
Key Stretching
Network Security
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Secure Code Review
Security As A Service
Security Controls
More ...
If you enjoyed this page, please consider bookmarking Simplicable.

Data Backup

Several data backup techniques compared.

Strong Password

A few examples of what makes a password strong or weak.

Encryption Examples

A definition of encryption with examples.

Zero-day Vulnerability

An overview of zero-day vulnerability.

Personal Information

A definition of personal information with examples.


A definition of cybersecurity with examples.

Public Network

A definition of public network with examples.


A definition of sandbox with examples.

Security vs Privacy

The relationship between security and privacy.


An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Canary Trap

A definition of canary trap with an example.


A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.


A definition of token with examples.


A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map