contact advertise search privacy policy


How Secure Is Your Network? Click for free Assessment



Home
Vulnerabilities
Press Releases
Search
Contribute

Newsletter

Current Issue
Subscribe

Resources

Articles
Viruses
Backend
Affiliates

Software

Linux
Windows

Archive

News
Vulnerabilities
Advisories
Press Releases
Newsletter







ScannerX: How Secure Is Your Network? Get free security assessment!

Security in Open versus Closed Systems - The Dance of Boltzmann, Coase and Moore
by Ross Anderson - Cambridge University, England

Some members of the open-source and free software community argue that their code is more secure, because vulnerabilities are easier for users to find and fix. Meanwhile the proprietary vendor community maintains that access to source code rather makes things easier for the attackers. In this paper, I argue that this is the wrong way to approach the interaction between security and the openness of design. I show first that under quite reasonable assumptions the security assurance problem scales in such a way that making it either easier, or harder, to find attacks, will help attackers and defendants equally. This model may help us focus on and understand those cases where some asymmetry is introduced.

However, there are more pressing security problems for the open source
community. The interaction between security and openness is entangled
with attempts to use security mechanisms for commercial advantage {
to entrench monopolies, to control copyright, and above all to control
interoperability. As an example, I will discuss TCPA, a recent initiative
by Intel and others to build DRM technology into the PC platform. Al-
though advertised as providing increased information security for users,
it appears to have more to do with providing commercial advantage for
vendors, and may pose an existential threat to open systems.

Download the paper in PDF format here.










+ Sun iPlanet Web Server Remote File Viewing Vulnerability
+ iPlanet Search Buffer Overflow Vulnerability
+ Watchguard Firebox Dynamic VPN Configuration Protocol Denial of Service Vulnerability
+ KF Web Server v1.0.2 Arbitary File and Directory Information Reading Vulnerability
+ Buffer Overflow in MyWebServer







+ RSA Security Embraces SAML Standard Across Product Lines
+ GFI Launches Email Exploit Engine - New Technology To Block Email Threats
+ McAfee.com Reaches Two Million Subscription Milestone
+ Rainbow Ships NetSwift iGate Web Security Appliance for Instant Private Webs







+ FourEyes 1.0
+ linksysmon 1.0.1
+ Nmap 2.54BETA37
+ ProBot 2.3.0
+ FreeRADIUS 0.6
+ aTrans 0.9
+ Snort 1.8.7



How Secure Is Your Network? Click for free Assessment