Hackers and Founders
نویسنده
چکیده
ISO17799 (formerly BS17799) is a standard for heuristic security management in organizations, and ISO20000 (formerly BS15000) is the ITIL reference document. Both of these are high-level, handwaving guidelines about service and business operations. True enough, they pay lip service to configuration management, but the configuration management they refer to is not the same as discussed in ;login:—it concerns software and information organization and revision/change control. The technical problem covered in ;login: is more about automation, tuning, and maintenance in operating systems. The principles are somewhat similar, but these ISO documents offer no solutions to implementation, only finger-wagging “should do’s” to be complied with.
منابع مشابه
Individualism; One's Position in Society, According to the Founders of Sociology
The concept of individualism in the field of sociology was introduced by the empirical scheme of one's position in society. The growing importance of the attention to this pattern affected by social changes has been rapid and rough. Cultural and social processes of modernization and modern age always create new conditions and stimulus leading to changes and verities in methods of individualizat...
متن کاملOpen to Grok. How do Hackers' Practices Produce Hackers?
How do hackers' practices produce hackers' identities? In this paper we argue that the association between science fiction and software programs is rooted in hackers' practices, defining how hackers' knowledge emerge. The mediation is the one of the Heinlein verb “to grok”, part of the Jargon file and of the name of a code browser, OpenGrok, the technology mediating the relationship between Ope...
متن کاملDiversity or Concentration? Hackers’ Strategy for Working Across Multiple Bug Bounty Programs
Bug bounty programs have been proved effective in attracting external hackers to find and disclose potential flaws in a responsible way. There are many different bug bounty programs, so how do hackers balance diversity and concentration to effectively build their reputation in the vulnerability discovery ecosystem? In this paper, we present a novel methodology to understand how hackers spread t...
متن کاملLooking for the Social Hackers
Motivated in part by the rising interest on social innovation, and also by the emergence of the networked social movements such as the Spanish ‘indignados’ and the ‘Occupy Wall Street’, the focus of this essay are the ‘social hackers’: innovators (or groups of innovators) which combine the technical skills of hackers with the civic or political orientation of social innovators. Hackers, working...
متن کاملSecurity Investment, Hacking, and Information Sharing between Firms and between Hackers
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or th...
متن کامل