This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
ci2010:team2_securing_software [2010/02/17 16:03] ablejde created |
ci2010:team2_securing_software [2010/02/17 16:10] (current) ablejde |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | The current approach to securing software is an incredibly self-destructive approach seemingly to someone from the outside. Instead of working to secure software, security researchers work to break software and then post the exploits publicly. This approach, while having some advantages, is ultimately dangerously flawed. | + | =====Securing Software: A flawed approach===== |
+ | [[ci2010:team2|back]] | ||
+ | The current approach to securing software is an incredibly self-destructive | ||
+ | approach seemingly to someone from the outside. Instead of working to secure | ||
+ | software, security researchers work to break software and then post the exploits | ||
+ | publicly. This approach, while having some advantages, is ultimately dangerously flawed. | ||
+ | |||
+ |