Computer Crime
Computer Crime
• Software vulnerabilities can affect both proprietary software (meaning software whose
source code is available only to the business that develops it) and open source software
(whose source code is available to the public at large).
• However, vulnerabilities that impact open source software pose extra risk in certain
respects. One main reason is that because anyone can view open source code, it’s easier in
some cases for attackers to identify flaws within open source that they can exploit.
Proprietary software isn’t subject to this risk, since in most cases attackers can’t view the
source code (although they can deploy other techniques in an effort to detect
vulnerabilities).
• The other main reason is that because open source software can typically be freely reused,
businesses routinely rely on open source. They may deploy open source applications
wholesale, and they may also copy parts of an open source codebase into their own
application or include open source libraries as dependencies for their applications. When
they do this, they create the risk that vulnerabilities that affect the open source code could
impact their business.
• This doesn’t mean you shouldn’t use open source software, which offers a variety of
advantages in many cases. But it does mean that it’s critical to know which open source
code your business depends on and whether any vulnerabilities affect that code.
How to Handle Software Vulnerabilities: Vulnerability Scanning and Beyond