Open security
Open security is the use of open source philosophies and methodologies to approach computer security and other information security challenges.[1] Traditional application security is based on the premise that any application or service (whether it is malware or desirable) relies on security through obscurity.[2]
Open source approaches have created technology such as Linux (and to some extent, the Android operating system). Additionally, open source approaches applied to documents have inspired wikis and their largest example, Wikipedia.[1] Open security suggests that security breaches and vulnerabilities can be better prevented or ameliorated when users facing these problems collaborate using open source philosophies.[1]
This approach requires that users be legally allowed to collaborate, so relevant software would need to be released under a license that is widely accepted to be open source; examples include the Massachusetts Institute of Technology (MIT) license, the Apache 2.0 license, the GNU Lesser General Public License (LGPL), and the GNU General Public License (GPL).[1] Relevant documents would need to be under a generally accepted "open content" license; these include Creative Commons Attribution (CC-BY) and Attribution Share Alike (CC-BY-SA) licenses, but not Creative Commons "non-commercial" licenses or "no-derivative" licenses.[1]
On the developer side, legitimate software and service providers can have independent verification and testing of their source code.[3] On the information technology side, companies can aggregate common threats, patterns, and security solutions to a variety of security issues.[4][5]
See also
- Kerckhoffs's Principle
- OASIS (organization) (Organization for the Advancement of Structured Information Standards)
- OWASP (Open Web Application Security Project)
- Open government
- Homeland Open Security Technology
- Open-source hardware
References
- ↑ 1.0 1.1 1.2 1.3 1.4 Wheeler, David A (2013-08-21). "What is open security?". Institute for Defense Analyses. Open Security. Retrieved 2013-09-07.
- ↑ Raymond, Eric S (2004-05-17). "If Cisco ignored Kerckhoffs's Law, users will pay the price". LWN.net. Retrieved 2011-06-21.
- ↑ "Open Security Foundation". Open Security Foundation. Retrieved 2011-06-21.
- ↑ "Open Web Application Security Project". Retrieved 2011-06-21.
- ↑ "Why have OSA?". OSA. Retrieved 2011-06-21.