Abstract:
Addresses the range of security vulnerabilities when a new software program is introduced on the market for consumers. It endeavors to provide a systematic approach to reporting and resolving these common forms of software protocol vulnerabilities. Additionally it describes the life-cycle model using check-point metrics and applies a specific case study to illustrate how vulnerability reports are generated via their company’s professional security system. The vulnerability report process is centered around three main pillars to help identify and remedy the error: originating, coordinating, and repairing.
Institution:
CERTS: Secure Programming Group - University of Oulu Finald (OUSPG).
Industry Focus:
Information & Telecommunication
Internet & Cyberspace