Vulnerability Centric Exploitation Attempts in Open Source Software Systems

There's been a lot of debate by security practitioners about the impact of open source approaches on security. One of the key issues is that open source exposes the source code to examination by everyone, both the attackers and defenders, and reasonable people disagree about the ultimate impact of this situation. It's been argued that a system without source code is more secure because, since there is less information available for an attacker, hence it should be harder for an attacker to find the vulnerabilities.

Provided by: International Journal of Computer Technology and Applications Topic: Security Date Added: Feb 2012 Format: PDF

Find By Topic