Difference between revisions of "Full vs. Responsible Disclosure of Vulnerabilities"

From CyberSecurity
Jump to: navigation, search
m
m
Line 6: Line 6:
 
* What peoples discover the vulnerabilities?
 
* What peoples discover the vulnerabilities?
 
* What peoples take the advantage of vulnerabilities?
 
* What peoples take the advantage of vulnerabilities?
* Once people discover vulnerabilities, how much should they disclose (full/partial)?  Who should they disclose to (public/academic/manufacturer-only)? When should they disclose?
+
* Once people discover vulnerabilities, how much should they disclose (full/partial)?  Who should they disclose to (public/government/academic-research/manufacturer-only)? When should they disclose?
 
* What constitute a responsible disclosure?
 
* What constitute a responsible disclosure?
 
* Does “Open Source” necessarily mean full disclosure?
 
* Does “Open Source” necessarily mean full disclosure?
 
* Comparing the disclosure of vulnerabilities to other non-cyber subjects, i.e. health, environment
 
* Comparing the disclosure of vulnerabilities to other non-cyber subjects, i.e. health, environment
* Should we have a public committee to manage/control the info of vulnerabilities?
+
* Should we have a public committee to manage/control the info flow of vulnerabilities?
 +
* Would a limited disclosure work?  Once a patch is release, hackers can apply reverse-engineering to understand the vulnerabilities.

Revision as of 20:59, 11 November 2005

http://en.wikipedia.org/wiki/Full_disclosure


  • What are software/hardware vulnerabilities?
  • Why should we disclose the vulnerabilities?
  • What peoples discover the vulnerabilities?
  • What peoples take the advantage of vulnerabilities?
  • Once people discover vulnerabilities, how much should they disclose (full/partial)? Who should they disclose to (public/government/academic-research/manufacturer-only)? When should they disclose?
  • What constitute a responsible disclosure?
  • Does “Open Source” necessarily mean full disclosure?
  • Comparing the disclosure of vulnerabilities to other non-cyber subjects, i.e. health, environment
  • Should we have a public committee to manage/control the info flow of vulnerabilities?
  • Would a limited disclosure work? Once a patch is release, hackers can apply reverse-engineering to understand the vulnerabilities.