No Software. No Source Code. No Problem.

Cover from No Software. No Source Code. No Problem.

Date: 7th September, 2010
By: Nigel Stanley
Format: InDetail

Download (subject to terms)
To access this paper you must first register and then login

The use of complex software is now part of daily business life. Unfortunately cyber criminals are taking advantage of this to spread malware and to attack systems with the aim of stealing information, money and intellectual property.

Information security specialists have been relatively successful in protecting networks and data systems from these cyber criminals but, to date, computer software has been an Achilles heel, open to attacks that take advantage of bugs and errors in computer code. Once a security bug is found it can be abused by cyber criminals whilst a business, in many cases, remains blissfully unaware that they are under attack. Computer software must therefore be checked for security related bugs

Post a review?

We welcome constructive criticism on all of our published content. Your name will be published against this review after it has been moderated. We reserve the right to contact you by email if needed.

Star Rating 1-5 (low-high):

If you don't want to see the security question, please register and login.