Security Concerns in Using Open Source Software for Enterprise Requirements

ثبت نشده
چکیده

Information security is the biggest challenge for network and ecurity administrators. The security of a given network highly depends o the software used and the administrative practices followed for operating systems, perimeter security, antivirus protection, intrusion detection, software development, systems and network monitoring, corporate mail, office productivity and so on. The rapid growth in Internet has resulted in several open source development communities. The collaborative effort of these communities has made it possible to have open source alternatives for almost all proprietary (also known as closed source) software. This paper highlights the security concerns of the end users in considering open source software for their enterprise requirements. This paper also highlights the risks pertaining to open source software and recommends certain guidelines following which these risks can be mitigated. These guidelines would help an end user to thoroughly evaluate open source software before they are considered for mission-critical functions. Open source software The words “Open Source” and “Open Source Software” refer to the software whose source code is available to the public and it can be used, modified and redistributed along with the original rights as defined by Open Source Initiative (OSI).1 These two terms are interchangeably used in the rest of this document. It is always distributed under a license which allows the user to use it the way he wants either for customizing it for his specific needs or for designing a commercial solution based on it. GNU General Public License (GPL) is the most commonly used license for this purpose. The derived solutions based on open source software should be distributed along with the source code and the recipient should get the same rights with which the original source is distributed. The word ‘open source software’ is sometimes misused to refer to the software whose source code is available but there are restrictions on its usage, modification and redistribution. Most of the universities, educational institutions and non-profit organizations use open source software. Many enterprises also use open source software but most of them do not disclose this information for various political and security reasons. Open source software is in fact so ubiquitous that the running gears of Internet such as mail transports and web servers mostly run on open source software. 1 “The Open Source Definition.” URL: http://www.opensource.org/docs/definition.php

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MDSE@R: Model-Driven Security Engineering at Runtime

New security threats arise frequently and impact on enterprise software security requirements. However, most existing security engineering approaches focus on capturing and enforcing security requirements at design time. Many do not address how a system should be adapted to cope with new unanticipated security requirements that arise at runtime. We describe a new approach Model Driven Security ...

متن کامل

Accommodating Openness Requirements in Software Platforms: A Goal-Oriented Approach

Open innovation is becoming an important strategy in software development. Following this strategy, software companies are increasingly opening up their platforms to third-party products. However, opening up software platforms to third-party applications raises serious concerns about critical quality requirements, such as security, performance, privacy and proprietary ownership. Adopting approp...

متن کامل

Modeling and Analyzing Openness Trade-Offs in Software Platforms: A Goal-Oriented Approach

[Context and motivation] Open innovation is becoming an important strategy in software development. Following this strategy, software companies are increasingly opening up their platforms to third-party products for extension and completion. [Question / problem] Opening up software platforms to thirdparty applications often involves difficult trade-offs between openness requirements and critica...

متن کامل

Security Requirements—A Field Study of Current Practice

The number of security flaws in software is a costly problem. In 2004 more than ten new security vulnerabilities were found in commercial and open source software every day. More accurate and consistent security requirements could be a driving force towards more secure software. In a field study of eleven software projects including e-business, health care and military applications we have docu...

متن کامل

Open Source Security Analysis - Evaluating Security of Open Source vs. Closed Source Operating Systems

Open source software is becoming a major trend in the software industry. Operating systems (OS), Internet servers and several other software applications are available under this licensing conditions. This article assesses the security of open source technology, namely the Linux OS. Since a growing number of critical enterprise information systems are starting to use Linux OS, this evaluation c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017