Question

In: Computer Science

Go online and search for information about a commercial off-the-shelf program that had a serious security...


Go online and search for information about a commercial off-the-shelf program that had a serious security problem. Describe the problem in a brief paper. Be prepared to share your findings with the class. 500 words

Solutions

Expert Solution

  • Software security comes out to be an important risk of using COTS software. The COTS software components contain important security concerns that it can find severe security risk into any Institution's or organization's software SCM (supply chain management). Security problem has occur when COTS components software with another software components to make an main composite applications where those applications can come into risks from their COTS software components.
  • Moreover, software industry followers such as Institute of SANS and the gratner believes that issues in supply chain brings a major threat to the sectors. It can be affect to the Information Technology supply chains for compromising and forcing changes in the scenario of the marketplace.
  • Also, according to the survey of SANS Institution few companies are perform their security reviews on every commercial household application and more than half of other companies do not perform security checks. The software companies depend on vendor reputation and legal liabilities or they don't have any strategies to deal with COTS components and maintain very limited visibility into the risks of the software supply chain by COTS.
  • Configuration control is also a bit tough. COTS vendors constantly update their software to bring upon new technology and to meet the majority of their customer demands. Unfortunately, using COTS products are not that familiar to be used in military aspects. First, security being the greatest concern for the military due to the characteristics involvement of COTS. COTS software is maintained in the form of a Grey box or black box. There is no existence of security warranty. With COTS, functionality moves up to a higher priority than security.
  • In other words, security is settled at the bottom of the list. COTS software 6 is widely available which increases the chances of risk that it falls into the hands of users with malicious threats. These users have the instance to reveal security drawbacks, that puts the risk for attack on the software systems. COTS software is huge and complex with multiple lines of source code hence, program bugs can easily lead to security vulnerabilities or issues.
  • Issues in the medical industry in COTS software are called as software of unknown pedigree for example software that has not been made with a known software development methodology, which pre-includes its use in medical devices. There are faults in COTS software components that could be become system and machine failures in the device if the system are not taken to ensure standards which compiled with components. In this industry, outlines specific practices to ensure that software of unknown pedigree components support the safety requirements for the device being formed.


Types of COTS Security concern:
Security vulnerabilities are the results of software problem, disadvantage, weaknesses, logical errors, and bugs also. Depending on how COTS software components which are used in DoD system also, their issues can maintain the security via the following methods:

  • The components of COTS can be allowed to access the resource in uncertified way that results other components might be failed to it’s function in the DOD system.
  • The component of COTS can be demean authorized concession and authority to manage over the system.
  • The component of COTS can be allowed to accessing unauthorized , uncertified , illegal , least requried resources of the DOD system .

*Please give an upvote if you find this solution helpful.


Related Solutions

Define a list of criteria that you would use to evaluate a commercial off the shelf...
Define a list of criteria that you would use to evaluate a commercial off the shelf system.
One of your friends had a very serious medical emergency and had to go to the...
One of your friends had a very serious medical emergency and had to go to the hospital for treatment. She was very upset because upon her arrival, she was asked for her insurance card, which she did not have, and was transferred to another hospital. You had learned there was a law that was passed that made this type of treatment by a hospital illegal. However, before telling your friend opinion, you wanted to find out more about this law...
Go to GoogleLinks to an external site. or any other search engine and search "Payroll Security"....
Go to GoogleLinks to an external site. or any other search engine and search "Payroll Security". Answer the following questions: a) Why does a payroll system need security or controls? b) List three controls that you would want to have on your payroll system.
The ways we communicate digitally with one another are constantly evolving. Search for information online about...
The ways we communicate digitally with one another are constantly evolving. Search for information online about the recent trends (that is, in the last year) in digital communication and digital marketing. (You are highly encouraged to read more than just the module manual for this question) Write a blog post about five of the trends that you find. For each trend: • Explain what the trend is (2 marks each). • Provide an example (1 mark each). Remember to reference...
Go online and search for an accounting related news article that is dated no earlier than...
Go online and search for an accounting related news article that is dated no earlier than six months from today and provide a brief summary (minimum one paragraph with a minimum of five sentences) in your own words of the news article along with the proper citations as to where you obtained the article. For your reference citation, please provide (1) the title of the article, (2) the author of the article, (3) the publication where the article is published,...
Go online and search for at least three companies that are considered great places to work....
Go online and search for at least three companies that are considered great places to work. Describe the compensation, benefits, and perks at each of these companies. Of the three, which is most appealing to you and why? (You must cite your resources used.) PLEASE DO NOT COPY AN EXISTING ANSWER FROM CHEGG
It would be most appropriate to buy an off-the-shelf training program when: Group of answer choices...
It would be most appropriate to buy an off-the-shelf training program when: Group of answer choices Employees need to learn company specific skills The company has a very strong culture to reinforce during employee training The number of trainees is low The situations dictates training must begin immediately Internal expertise is available to design customized training
Through the use of online tools and search facilities, ordinary users can acquire personal information about...
Through the use of online tools and search facilities, ordinary users can acquire personal information about others. As a matter of fact, anyone with internet access can use search engines such as Google to find out information about another individual. Sometimes, the person who is the subject of research is completely unaware that the information is publicly available. Does this use of search engines pose a threat to the privacy of ordinary people? Explain your answer.
you can search online and find information about the novel. I searched but I don't understand...
you can search online and find information about the novel. I searched but I don't understand anything because the English not my native language I can't understand this novel to answer these question please help me (please my last chance please help) Can you please help me with these Discussion Questions for Shelley’s Frankenstein: Questions for Volume I: The novel’s title page prompts readers to link Frankenstein with Prometheus. Familiarize yourself with Prometheus. In what way is the myth relevant...
How serious is the policy violation in information security? Meaning, did it put the company at...
How serious is the policy violation in information security? Meaning, did it put the company at greater risk, data exposure, or personnel issue.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT