Open-Source Software
Open-Source Software
Open-source software
Open-source software is often free to use, and is developed by a community of
volunteers. Some advantages of open-source software include:
● Cost-effective: Open-source software is typically free to use.
● Community-driven: New features and standards are implemented quickly.
● Security: A large community monitors the development, making it more
secure.
Flipside
Flipside is a company that uses open-source technology to build web-based tools
that help organizations create social impact. Flipside believes that clients should
not be forced to depend on their support after a project is delivered. They use
open-source technologies to avoid vendor lock-in
Many Eyeballs
People using open source programs are most likely to look at the
source code when they notice something they’d like to change.
Unfortunately, that doesn’t mean the program gets free security
audits by people good at such things. It gets eyeballs looking at the
parts of the code they want to change. Often, that’s only a small part
of the code. What’s more, programmers preoccupied with adding a
feature generally aren’t thinking much about security when they’re
looking at the code.
Snapshot effect
Vulnerability scans capture vulnerabilities that exist at the time of the scan, but
miss any new vulnerabilities that arise after the scan.
Known vulnerabilities
Vulnerability scanners focus on known vulnerabilities, and may not detect new or
unknown vulnerabilities, such as zero-day exploits.
Complex infrastructure
As organizations grow, their IT infrastructure becomes more complex, making it
harder to detect vulnerabilities.
Human input
Security experts may need to review scan results, complete remediation, and
follow up to ensure risks are mitigated.
Prioritization
Prioritizing remediation can be difficult, as it requires reaching consensus among
multiple people who may have different priorities.
Context
It can be difficult to determine intent from a connection to a port, even with
additional context. For example, a "known bad" connection may actually have a
good intent.
Two More Open-Source Fallacies