List the issues involved in the software vulnerability reporting argument. What are the technical issues? The psychological and sociological ones? The managerial ones? The economic ones? The ethical ones? Select a vulnerability reporting process that you think is appropriate and explain why it meets more requirements than any other process.

What will be an ideal response?

Technical: The reported vulnerability may be easy, difficult, or impossible to fix.

Psychological and sociological: Reported vulnerabilities may cause a company embarrassment or may harm its reputation irrevocably. Publicizing a vulnerability can do wonders for the career of the person who found it.

Managerial: Ideally, the company whose product is vulnerable can manage the release of information in a responsible way that results in the vulnerability being successfully patched without giving potential attackers time and opportunity to exploit it.

Economic: Vulnerabilities may be worth a great deal of money on theblack market. Particularly nasty vulnerabilities can cost product companies a great deal. Vulnerabilities that are exploited before they can be patched can cost victims arbitrarily large amounts of money.

Ethical: Product companies are ethically responsible for patching significant vulnerabilities in deployed products before those vulnerabilities can cause meaningful harm to customers.Those who discover vulnerabilities are ethically responsible to disclose vulnerabilities responsibly in order to create a strong possibility that the vulnerabilities will be remediated before they can be exploited.
Other issues, such as bug bounties or what to do when product companies refuse to patch, are more ethically mixed.

Computer Science & Information Technology

You might also like to view...

Which software product release category is "generally feature complete and supposedly bug free, and ready for use by the community?"

a. Alpha. b. Beta. c. Release candidate. d. Continuous beta.

Computer Science & Information Technology

You can use the ____ associated with a query to invoke the query during run time.

A. properties B. methods C. objects D. values

Computer Science & Information Technology