country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Dependent And Source Independent Security

tag 0 Download9 Pages 2,182 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Dependent and Source Independent Security.
 
 

Answer:

Introduction

Technology has become an integral part of the organizations in the present times. There are several technical tools and software that have been launched in the market and are being used by the business units in all the parts of the globe. There are several methods through which these tools and software can be acquired. One of such methods is the use and implementation of open source software (OSS). There are several advantages of such software, such as no involvement of costs, immediate access, easy implementation etc[1].

However, there are also certain drawbacks and issues that the management needs to overcome with the use of open source software. The report discusses these issues from the perspective of the management and also covers the issues that may come up during the transition phase. A comparison between open source software and proprietary software has also been included in the report.

Management suffers from a number of issues in adopting open source software. Some of these issues have been listed and explained below.

There are a number of application platforms that are not compatible with the open source software. The management may face issues in terms of testing and launch of such software in the organization as an outcome of the compatibility issues. A detailed compatibility analysis along with the study of a large number of application platforms is required to be done to come up with an option that fulfills the compatibility criteria of the OSS.

Pre-release review of a software is essential as it highlights the bugs and the areas of improvement in the software. The review of pre-release version of the open source software is difficult as the users know that the software will be available for free of cost at the time of the final release as well. This makes it difficult to attract the users to invest their time in the review of the pre-release version. It becomes necessary for the management to develop a marketing strategy in advance so that the market anticipation can be set up well among the users.

 

There are numerous legal issues that may emerge in association with the open source software that are required to be handled by the management.

  • Licenses that are associated with the open source software are in different forms. There are different terms and conditions that are included under all of these license types. For most of the licenses, it becomes necessary to disclose the source code[2].

Licenses Used for OSS

  • There is a usage restriction that is applied on the software for the users who make use of the modified copies.
  • Risk minimization may also come up as a legal issues especially for the users in the categories of software vendors and software developers.

One of the most common forms of issues that are associated with Open Source Software are the security issues.

The source code of the software becomes available to all which makes it possible for the malevolent entities to exploit the same by using methods, such as hacking and virus attacks.

For instance, the organization is thinking over the usage and implementation of MySQL software as the database tool. There is a critical MySQL vulnerability that recently had an impact on almost every version of the software[3]. There were malware codes that were injected in the configuration files of the software that allowed the attackers to gain entry to the server on which the database system was running.

There is another attack that is being successfully attempted by the attackers which is called the Drown attack. This is the security vulnerability that has an adverse impact on HTTPS and other services that are associated with Secure Socket Layer (SSL). The encryption mechanisms that are applied on the files are broken down by the Drown attack along with other security protocols[4].

In case of occurrence of any of these or other forms of security attacks, there is a lot of damage that is done to the open source software along with the information sets that are associated with the organization. It, therefore becomes the accountability and responsibility of the management to develop and implement the measures to avoid such security issues.

Most of the open source software come with poor documentation which makes it difficult to understand the features and functionalities of the software.

Due to the lack of proper documentation, it becomes necessary for the management to provide additional trainings for the employees to make them understand the features of the software. There is an additional cost and effort that is spent in this activity.

 

Issues in the Transition Process

The transition process in the adoption of an open source software for an organization includes a lot many steps and stages.

There are certain pre-requisites that must be completed before the initiation of the transition process. The first and the foremost step shall be the planning and analysis activities that must be completed. There shall be an implementation plan that must be set up in advance by the management which shall be followed during the process of transition. It would also be required to ensure that the compatibility analysis of the software with the application platforms implemented in the organization is carried out in advance and there are positive results achieved in the same.

Feasibility studies on the parameters of technical, operational and financial feasibility must also be done so that management has a complete account of the success of the process. The assessment of the risk areas and their treatment procedures must also be made.

The transition shall begin after the completion of the above steps. The transition approach must be a phased approach rather than Big Bang Implementation of the software. This is because of the reason that the success rate will be higher with such an approach.

There can be a number of issues that may come up during the transition process which have been listed below.

  • Adopting and making a transition to the open source software will introduce numerous changes for the organizations and its members of the staff. These changes may become difficult to deal in case of absence of a change management plan. The changes may also have a negative implication on the productivity of the employees which may bring down the reputation of the organization[5].
  • The existing set of processes and methods may be affected by the transition process in association with the open source software. It is because of the reason that the other technical tools will be required to be integrated with this software which may bring down the working of the other tools.
  • During the initial stages of transition, there may be many security vulnerabilities that may be created. These security vulnerabilities and loopholes may be used by the malevolent entities to give shape to the security risks and attacks. In this manner, the organizational information sets and applications may be put at risk.
  • The customers prefer the business units and organizations that have a smooth functioning and the ones that are always available. However, in the case of transition process associated with the open source software, the availability and smooth functioning of the business may get impacted in a negative manner.

These transition issues can have some of the extremely severe impacts and it may become difficult for the management to deal with the same.

 

Comparison between OSS & Proprietary Software

Point of Difference

OSS

Proprietary Software

Cost

This form of software comes for free of cost. There are certain utilities that may be required to be purchased additionally; however, the cost of such utilities is also negligible[6].

There is a huge initial investment that is required to be made at the time of purchase. The updates may also be chargeable in this case.

Level of Support

There may not be a consistent support promised and offered by the vendors of OSS.

It becomes the accountability and responsibility of the vendor to provide support to the users in case of any query or technical assistance.

Development Process

It is not ensured that the development process will be carried out or not.

Consistent feature development of the software is offered in this case.

Stability and Reliability

This type of software offers lesser reliability and stability to the users.

It is more stable and reliable in nature as compared to OSS[7].

Vendor Lock-in

Vendor lock-in is not possible in this case making redistribution easier and also makes the software more flexible.

The vendor owns the software and the entire ownership and authority is in the hands of the vendor in this case.

Point of Failure

There is no single point of failure and the detection of the bugs can be done easily.

There can be a single point of failure present in this case.

There are set of pros and cons that are associated with OSS as well as proprietary software. Open source software offers many benefits to the business organizations and users. The primary benefit is in the form of the costs as these come for free of cost. There are also additional benefits offered in the form of flexible solution, no single point of failure, no vendor lock-in etc.

 

Conclusion

The choice of open source software shall be based upon the organizational needs. The start-up and small scale units can go for this form of software as it comes for free of cost. These software packages can also be acquired by the business units that do not wish to put complete ownership of the software on the vendor.

 

Annotated Bibliography

Aviram, N, & S Schinze, "DROWN: Breaking TLS using SSLv2.". in , , 2016, <https://drownattack.com/drown-attack-paper.pdf> [accessed 27 October 2017].

Aviram and Schinzel have covered the details of the DROWN attack in their article. The meaning and background of the attack along with its mechanism has been covered. There is good use of figures and tables done in the article to support the information that is covered. The authors could have also added the details on the case studies in the form of victims that have been affected by this attack.

Clarke, R, & D Dorwin, "Is Open Source Software More Secure?.". in , , 2015, <https://courses.cs.washington.edu/courses/csep590/05au/whitepaper_turnin/oss(10).pdf> [accessed 27 October 2017].

The authors, Clarke and Dorwin, have covered the security issues that are associated with OSS. Source dependent and source independent security vulnerabilities have been explained by the authors along with the analysis of the security tools and socioeconomic factors. The authors could have made use of the case studies to further strengthen their information and details covered in the article.

Fontana, R, B Kuhn, E Moglen, M Norwood, D Ravicher, & K Sandler et al., "A Legal Issues Primer for Open Source and Free Software Projects.". in , , 2008, <https://www.softwarefreedom.org/resources/2008/foss-primer.pdf> [accessed 27 October 2017].

Richard and fellow authors have covered the several legal issues that are associated with the open source software. The set of issues that have been covered include the licensing issues, copyright enforcement issues, and patent and trademark issues along with many other organizational issues in the legal framework. There is no use of graphics in the article which could have been included.

Pankaja, N, & M Raj, "Proprietary software versus Open Source Software for Education.". in , , 2013, <https://www.ajer.org/papers/v2(7)/O027124130.pdf> [accessed 27 October 2017].

Pankaja and Raj have covered the comparison between proprietary and open source software in the article. Definition of both of these software types and other models has been covered with the details on the comparison on the basis of different parameters. The authors could have further strengthened the information by making use of graphics.

Scacchi, W, & T Alspaugh, "Issues in Development and Maintenance of Open Architecture Software Systems.". in , , 2017, <https://www.ics.uci.edu/~wscacchi/Papers/New/Scacchi-Alspaugh-Crosstalk-2017.pdf> [accessed 27 October 2017].

Scacchi and Alspaugh have included the information on the various developmental, maintenance and transition issues that are associated with OSS. The authors have classified the issues on the basis of the issue type and possible impact. There could have been good use of the case studies and examples in the article.

Singh, A, R Bansal, & N Jha, "Open Source Software vs Proprietary Software.". in , , 2015, <https://pdfs.semanticscholar.org/48b7/64286fde00991c9b8ffc2b88ee8a6c7207b3.pdf> [accessed 27 October 2017].

Amandeep Singh and fellow authors have described the comparison between OSS and proprietary software in the article. There is an explanation of both of these software types covered in the article along with the comparison on the basis of costs, flexibility, security, reliability and other parameters. These is a good use of table to strengthen the information which could have been further enhanced by the use of real-life scenarios.

Smith, A, K Niemeyer, D Katz, L Barba, G Githinji, & M Gymrek et al., "Journal of Open Source Software (JOSS): design and first-year review.". in org, , 2017, <https://arxiv.org/abs/1707.02264> [accessed 27 October 2017].

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Dependent And Source Independent Security. Retrieved from https://myassignmenthelp.com/free-samples/dependent-and-source-independent-security.

"Dependent And Source Independent Security." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/dependent-and-source-independent-security.

My Assignment Help (2018) Dependent And Source Independent Security [Online]. Available from: https://myassignmenthelp.com/free-samples/dependent-and-source-independent-security
[Accessed 19 January 2020].

My Assignment Help. 'Dependent And Source Independent Security' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/dependent-and-source-independent-security> accessed 19 January 2020.

My Assignment Help. Dependent And Source Independent Security [Internet]. My Assignment Help. 2018 [cited 19 January 2020]. Available from: https://myassignmenthelp.com/free-samples/dependent-and-source-independent-security.


With time, MyAssignmenthelp.com has become one of the best college essay writing services. Our all rounded services give students the confidence to overcome assignment related issues. Our services are fast enough to meet most urgent deadlines. We are capable of delivering fast essay writing services with the help of our specially designed provisions and writers' teams. Our urgent essay help services guarantee most rapid delivery of assignment solutions. Some of our most popular essay services are application essay help, exploratory essay help, literary review essay help and argumentative essay help.

Latest Management Samples

UNCC300-Inequity In The Distribution Of Educational Resources

Download : 0 | Pages : 4

Answer: Introduction There are several challenges with realizing aspirations of the common good in professional community whether locally or globally. In this opinion editorial, it is going to focus on inequity in the distribution of resources as a challenge in realizing aspiration for the common good in a professional community. Inequity in the distribution of educational resources In a professional society, knowledge and skills is a key f...

Read More arrow

MBA402 Governance, Ethics, And Sustainability Report

Download : 0 | Pages : 11

Question: Introduction: Organisation sustainability is one of the major development aspects of the productive nature of the organisation in case of employees’ engagement and productivity. There are some situations where business dealings are not justified their places and that create a problem for the company as well as for employees. Some rules are needed to be revised as the report detailing form the commission are not highlighted at ...

Read More arrow

BSBCUS501-Customer Service Plan Of Innovative Widgets

Download : 0 | Pages : 6
  • Course Code: BSBCUS501
  • University: Victoria University
  • Country: Australia

Answer: Vision and Mission Vision The vision of Innovative Widgets is to render the best quality and reliable widgets for different machines at reasonable prices to its customers and also to meet customer servicing needs in an effective fashion. Mission The mission of Innovative Widgets is to render innovative product solutions to the customers and also to provide the right quality of customer services both for its internal and external cu...

Read More arrow

MGT726 Managerial Project Resolution Of Scaffolding

Download : 0 | Pages : 14

Answer: Introduction The purpose of this project report is to give an overview regarding the progress to date of the management problem regarding the complaints received by Caledonia scaffolding from residents of the locality and regarding utilisation of resources due to construction of scaffolding (Kumar et al. 2013). This project will address the progress done so far about analysing the various research objectives and research problem relat...

Read More arrow

ONPS1050 Guidelines For Postgraduate Report

Download : 0 | Pages : 12

Answer: Introduction Immunotherapy is used for the purpose of treating the disease by two different ways, suppressing or activating the immune system. Immunotherapies are designed to trigger or exhibit an immune response are called activation immunotherapies. On the other hand, the therapies that suppress or reduce the immune response are known as suppression immunotherapies (Gorelik et al., 2015). Immune therapies can be used to treat the in...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,180,645

Orders

4.9/5

Overall Rating

5,056

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1758 Order Completed

99% Response Time

William Martinez

MS in Biology

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

234 Order Completed

100% Response Time

Samantha Ji

PhD in Chemistry with Specialization in Organic

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Fantastic writing! My professor said that it was one of the nest written papers for this week. Thank you very much for your awesome writing efforts.

flag

User Id: 362905 - 19 Jan 2020

Australia

student rating student rating student rating student rating student rating

Excellent quality assignment and ahead of dateline. Responses effectively when amendment requested. Thank you for the work, freeing me from the emotional journey.

flag

User Id: 318404 - 19 Jan 2020

Australia

student rating student rating student rating student rating student rating

Thank you very much for your wonderful help. I received an excellent mark for my assignment.

flag

User Id: 324773 - 19 Jan 2020

Australia

student rating student rating student rating student rating student rating

This solution was really good and on time delivery thanks for the good work, thanka

flag

User Id: 210398 - 19 Jan 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?