A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

5 Examples of a Sandbox

 , updated on
A sandbox is a virtual container for running software. They are designed to prevent software from damaging anything outside the container. A sandbox is typically disposable such that it is created to run some software and then discarded. The following are illustrative examples of a sandbox.

Software

Tools that allow users to run software they don't trust in a sandbox such that it can't damage their devices or access their private data. A sandbox looks like a complete system to the software such that it can't typically detect that it's constrained to a virtual environment.

Web Browsers

It is common to run a web browser that you trust inside a sandbox. If a website exploits a vulnerability in your web browser, the damage can be minimized to the sandbox.

Security

Security tools may use sandboxes for research or detection of malicious digital entities. For example, a security tool may install and run software or visit websites to monitor what files end up being changed.

Virtualization

Virtualization such as a virtual machine is essentially a type of sandbox. For example, a web host may offer 20 virtual machines to customers on one physical machine. Each virtual machine can only access a container of resources. This provides stability as no single customer can hog resources or crash the machine.

Platforms

Software platforms typically run things in containers with limited resources such that one system, application, service or component can't crash the platform.
Overview: Sandbox
Type
Definition
A virtual container for running software.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Data Backup

Several data backup techniques compared.

Strong Password

A few examples of what makes a password strong or weak.

Encryption Examples

A definition of encryption with examples.

Zero-day Vulnerability

An overview of zero-day vulnerability.

Personal Information

A definition of personal information with examples.

Cybersecurity

A definition of cybersecurity with examples.

Public Network

A definition of public network with examples.

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map