Avoiding Liability: An Alternative Route to More Secure Products
نویسنده
چکیده
A debate rages over imposing liability on manufacturers or users of insecure systems. Imposing either liability or fines on the creators or users of insecure systems may work, but how are buyers to distinguish? We propose a variety of signals and analyze them. We evaluate when signals may be preferable to liability as a mechanism for enhancing security.
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملThe Suprachoroidal Route in Glaucoma Surgery
Glaucoma surgeries targeting the uveoscleral drainage pathways have been drawing more attention lately. Among all the available techniques, procedures focusing on the supra-choroidal space seem particularly promising, by making use of a presumably efficient and secure outflow route and avoiding subconjunctival filtration blebs. The purpose of this review is to assess the efficacy and the securi...
متن کامل