home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page796.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  79KB  |  817x1045  |  8-bit (256 colors)
Labels: book | hakham | monitor | sky | web site
OCR: 7 2 8 SECTION CHAPTER 1.2 MITIGATION What happens when vulnerabilities are discovered in prod- ucts that have already shipped? Despite defensive programming and other tactics to produce secure software some defects inevitably remain undiscovered in products that end up in the hands consumers Some of i those defects could be discovered and exploited by attackers. To be fair, some exploits are caused by factors that didn't exist when soft- ware product was in development For example features of a new operat- ing system might interact with product in such way that previously secure code suddenly becomes vulnerable When software bugs are dis- covered especially if the bugs are being exploited by attackers -the pro- grammer's remaining line of defense to produce bug fix or patch What's up with ...