Difference between revisions of "Student Projects:CyberSecurity"

From CSEP590TU
Jump to: navigation, search
(Attack, Defense, and Responsibility)
(Who takes responsibility for security flaws and exploitations?)
Line 4: Line 4:
 
=== Who takes responsibility for security flaws and exploitations? ===
 
=== Who takes responsibility for security flaws and exploitations? ===
 
When the software is produced by companies? By individuals? If it's open sourced?
 
When the software is produced by companies? By individuals? If it's open sourced?
 +
<br>What kind of incentives are there for companies/open source groups to produce more reliable software?  For example, if the originator of the code is responsible, is the threat of law suites when something goes wrong strong enough of an incentive or possible even too strong?  Can these incentives be improved?

Revision as of 16:29, 29 October 2004

Attack, Defense, and Responsibility

Threat trends over the next 10 years

Defense trends over the next 10 years

Who takes responsibility for security flaws and exploitations?

When the software is produced by companies? By individuals? If it's open sourced?
What kind of incentives are there for companies/open source groups to produce more reliable software? For example, if the originator of the code is responsible, is the threat of law suites when something goes wrong strong enough of an incentive or possible even too strong? Can these incentives be improved?