Hahn, Robert W.; Layne-Farrar, Anne
September 2006
Harvard Journal of Law & Public Policy;Fall2006, Vol. 30 Issue 1, p283
Academic Journal
The article seeks to address software security problems by presenting a comprehensive assessment of the software security issue using a law and economics framework. It provides definition of software security that demonstrates the complexity of the problem. Types and methods of software attacks, such as worms and viruses, are also cited. It also examines the different aspects of software system security as well as the underlying market failures that complicate efforts to address such problems.


Related Articles

  • Backdoors in Compaq Insight Manager tool still cause headaches for security staff. McClure, Stuart; Scambray, Joel // InfoWorld;10/18/99, Vol. 21 Issue 42, p50 

    Revisits a vulnerability in the Compaq Insight Manager (CIM) Agent which caused problems for security staff. Problems with CIM software; Information on the security advisory posted by Compaq; Solution to the security problem in CIM.

  • Maturity … it happens. Rothman, Mike // Network World;3/13/2006, Vol. 23 Issue 10, p22 

    The article comments on the importance of the use of anti-virus software. According to the author, companies have been facing the oversight of various regulators to make sure private information has been protected and an adequate financial controls. The author added that companies must focus on...

  • Major Concerns In 2009.  // Database & Network Journal;Feb2009, Vol. 39 Issue 1, p25 

    The article reports on findings by BitDefender on electronic threats in 2008 and 2009. BitDefender focused on software vulnerabilities, exploits, different types of malware, cyber crime prevention and law enforcement. More than 80 percent of malware distributed worldwide in 2008 consisted of...

  • Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software. Sasirekha, N.; Hemalatha, M. // International Review on Computers & Software;Aug2013, Vol. 8 Issue 8, p1980 

    Software security has become one of the active areas of research due to various cyber threats and attacks that can be very dangerous. The main goals of software protection are Intellectual property protection, Protection beside function investigation in mobile environments, Protection beside...

  • A Method for Memory Integrity Authentication Based on Bloom Filter. Nianmin, Yao; Haifeng, Ma; Yong, Han // Journal of Algorithms & Computational Technology;Sep2014, Vol. 8 Issue 3, p267 

    Secure processor architectures can provide secure computing environments. All kinds of applications that need high security should be immune to both physical and software attacks through the secure architectures. Memory integrity verification is a key problem while implementing secure...

  • Security, Microsoft Style: No Safety Net? Manes, Stephen // PC World;Nov2001, Vol. 19 Issue 11, p210 

    Discusses security problems in Microsoft computer software, which are discovered an average of more than six times a month. Mention of the buffer-overflow error which allowed the Code Red worm to attack; View that Microsoft's security precautions are lax; Mention of Windows XP's firewall, which...

  • Christmas virus hits town early. Knowles, Anne // PC Week;08/23/99, Vol. 16 Issue 34, p10 

    Warns of a computer virus known as Win32.Kriz.3862, or the Christmas virus due to its planned launch on December 25, 1999. The virus to affect users of Windows 95, Windows 98 and Windows NT; Impact of the virus in Asia; Preparation of anti-virus software makers.

  • Keeping pace…for now. Hurley, Billy // Information Security;Apr2007, Vol. 10 Issue 4, p21 

    The article focuses on antimalware and web filtering which protects an infrastructure from malicious code. malware defense is said to require various approaches. According to John Hornbuckle, network manager for the Taylor County school district in Florida, the antimalware technology offers a...

  • Malware Grows Up, Gets Hard To Stop. Dumiak, Michael // Bank Technology News;May2007, Vol. 20 Issue 5, p15 

    The article focuses on the problems associated with the proliferation of malware, referencing to the Super Bowl and Centers for Disease Control malware incidents in the U.S. The author relates that malware has evolved into a staggering array of noxious varieties and strains which make it more...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics