SlideShare a Scribd company logo
1 of 21
Presented By
Shweta Ghate
MIT college of Engineering
Agenda
•Introduction of Virus.
• Types of Viruses
• Legal issues of
Protection
• Handling Third Party
Software.
•References
Introduction To Virus
Definition
 A virus is a computer program that
can copy itself and infect a computer
without the permission or knowledge
of the owner.
 Viruses can damage your hardware,
software or files and replicate
themselves.
Types of Virus
There are two main types of virus.
1.Resident
• A VIRUS doing same thing with the
help of Operating system and
memory called Residential virus
2.Non-resident
• Those viruses searching new file to
affect called Non-residential virus.
Basic Types Of Virus
 Trojan Horses
Appears as interesting program file but when
installed it allows intruders to access and read
your files.Eg: “I LOVE YOU“.
 Worms
Virus that copies and multiplies itself by using
computer networks and security flaws. Eg.“CODE
RED”
 E-mail Viruses
Use e-mail messages to spread which allow it to
automatically forward itself to thousands of
people Eg. Rasom virus
Types of Virus
Boot Sector Virus
• A boot sector virus infects diskettes and hard drives.
• Boot sector viruses often spread to other computers by
the use of shared infected disks and pirated software
applications.
.Program viruses
• Active when the program file (usually with extensions
.BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is
opened.
• Once active, the virus will make copies of itself and will
infect other programs on the computer.
Continued….
Macro Virus
• Programmed as a macro embedded in a
document, usually found in Microsoft Word and
Excel
• Once it gets in to your computer, every
document you produce will become infected
• Relatively new type of virus and may slip by
your antivirus software if you don't have the
most recent version installed.
• Eg. Melissa
Multiparitite virus
• Hybrid of a Boot Sector and Program viruses.
• Infects program files and when the infected
program is active it will affect the boot record
Virus-Legal Issues of protection
Grounds on which virus creation or
distribution may be found to be illegal
• Unauthorized Access
Any kind of access without the
permission
E.g :Hacking
• Unauthorized Modification
Any kind of modification to the data without
the permission of the User
Eg. Email attacks
Continued…
Incitement
• Includes making available viruses, virus
code, information on virus creation, and
virus engines.
Denial of Service attacks
• Flooding a computer resource with more
requests than it can handle. This causes
the resource to crash thereby denying
access of service to authorized users.
Continued..
• All such kind of attacks come under
Cyber Crime i.e “unlawful acts wherein the
computer is either a tool or target or both”.
• Thus to control the Cyber Crime “Cyber
Laws “ were introduced .
Cyber Laws
 The world 1st computer specific law was enacted
in the year 1970 by the German State of Hesse
in the form of „Data Protection Act, 1970’
with the advancement of cyber technology.
 Indian parliament passed its “INFORMATION
TECHNOLOGY ACT, 2000” on 17th October to
have its exhaustive law to deal with the
technology .
IT ACT OF INDIA 2000
 The Information Technology Act, 2000 aims to
provide for the legal framework so that legal
sanctity is accorded to all electronic records and
other activities carried out by electronic means.
 This ACT defines many CHAPTERS, which
defines different kinds of punishments for
different types of crime.
IT ACT OF INDIA 2000
CHAPTER IX
• Act talks about penalties and adjudication
(preparing official judgment)for various
offences.
• The penalties for damage to computer
systems etc. has been fixed as damages
by way of compensation not exceeding Rs.
1,00,00,000 to affected persons.
Continued…
 Penalty : 2year prisonment or/and 2lack
penalty
 The Act talks of appointment of any officers
not below the rank of a Director to the
Government of India or an equivalent officer
of state government.
 Adjudicating Officer has been given the
powers of a Civil Court.
Protection mechanism
• Anti-virus
• Firewall
• Recovery
• Online Backup Data
Handling Third Party Software
• Third party software refers
to programs that are developed by
companies other than the company
that developed the
computer's operating system.
• Eg. Windows programs developed by
companies other than Microsoft are
called third party programs.
Continued..
 The risk is not in code that internal developers have
written, but in components provided by outside
developers, whether open-source libraries or third-party
toolkits.
 There is an assumption that vendors and open-source
developers have gone through the security checkpoints
during the application development process, and that
assumption is false.“
 To secure their software, companies must first figure out
which code components have become part of their code
base
Continued…
 To analyze the software the developers
and IT security teams need to do an
application assessment .
 They need to find the vulnerabilities in the
software :
through static analysis
by monitoring the developer's support
forum
through an intelligence service that
tracks changes to software.
 The company can then make an informed
Continued….
Binary only Source
Publicly
available
e.g. downloadable
"Software"
Bilateral Agreements
e.g. "Collaboration
Agreements"
Publicly
available
"Open Source"
"Free Software"
References
• www.opensource.org
• www.wiseGEEK.com
• www.spamlaws.com
• www.cyberlawsindia.net
• Chieh-jen,Chao-Ching Wang,” A Scalable
High-Performance Virus Detection
Processor Against a Large Pattern Set for
Embedded Network Security ” ,IEEE,
pages 841-854, May 2012.
computer virus and related legal issues

More Related Content

What's hot

What's hot (20)

Antivirus
AntivirusAntivirus
Antivirus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 

Similar to computer virus and related legal issues

Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attackBhavesh soni
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 

Similar to computer virus and related legal issues (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious
MaliciousMalicious
Malicious
 
computer security
computer securitycomputer security
computer security
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 

More from Shweta Ghate

Memory technology and optimization in Advance Computer Architechture
Memory technology and optimization in Advance Computer ArchitechtureMemory technology and optimization in Advance Computer Architechture
Memory technology and optimization in Advance Computer ArchitechtureShweta Ghate
 
Data mining technique (decision tree)
Data mining technique (decision tree)Data mining technique (decision tree)
Data mining technique (decision tree)Shweta Ghate
 
Unified process,agile process,process assesment ppt
Unified process,agile process,process assesment pptUnified process,agile process,process assesment ppt
Unified process,agile process,process assesment pptShweta Ghate
 
Open source web GIS
Open source web GISOpen source web GIS
Open source web GISShweta Ghate
 
Introduction to 3G technology
Introduction to 3G technologyIntroduction to 3G technology
Introduction to 3G technologyShweta Ghate
 
Domain logic patterns of Software Architecture
Domain logic patterns of Software ArchitectureDomain logic patterns of Software Architecture
Domain logic patterns of Software ArchitectureShweta Ghate
 

More from Shweta Ghate (6)

Memory technology and optimization in Advance Computer Architechture
Memory technology and optimization in Advance Computer ArchitechtureMemory technology and optimization in Advance Computer Architechture
Memory technology and optimization in Advance Computer Architechture
 
Data mining technique (decision tree)
Data mining technique (decision tree)Data mining technique (decision tree)
Data mining technique (decision tree)
 
Unified process,agile process,process assesment ppt
Unified process,agile process,process assesment pptUnified process,agile process,process assesment ppt
Unified process,agile process,process assesment ppt
 
Open source web GIS
Open source web GISOpen source web GIS
Open source web GIS
 
Introduction to 3G technology
Introduction to 3G technologyIntroduction to 3G technology
Introduction to 3G technology
 
Domain logic patterns of Software Architecture
Domain logic patterns of Software ArchitectureDomain logic patterns of Software Architecture
Domain logic patterns of Software Architecture
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

computer virus and related legal issues

  • 1. Presented By Shweta Ghate MIT college of Engineering
  • 2. Agenda •Introduction of Virus. • Types of Viruses • Legal issues of Protection • Handling Third Party Software. •References
  • 3. Introduction To Virus Definition  A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner.  Viruses can damage your hardware, software or files and replicate themselves.
  • 4. Types of Virus There are two main types of virus. 1.Resident • A VIRUS doing same thing with the help of Operating system and memory called Residential virus 2.Non-resident • Those viruses searching new file to affect called Non-residential virus.
  • 5. Basic Types Of Virus  Trojan Horses Appears as interesting program file but when installed it allows intruders to access and read your files.Eg: “I LOVE YOU“.  Worms Virus that copies and multiplies itself by using computer networks and security flaws. Eg.“CODE RED”  E-mail Viruses Use e-mail messages to spread which allow it to automatically forward itself to thousands of people Eg. Rasom virus
  • 6. Types of Virus Boot Sector Virus • A boot sector virus infects diskettes and hard drives. • Boot sector viruses often spread to other computers by the use of shared infected disks and pirated software applications. .Program viruses • Active when the program file (usually with extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened. • Once active, the virus will make copies of itself and will infect other programs on the computer.
  • 7. Continued…. Macro Virus • Programmed as a macro embedded in a document, usually found in Microsoft Word and Excel • Once it gets in to your computer, every document you produce will become infected • Relatively new type of virus and may slip by your antivirus software if you don't have the most recent version installed. • Eg. Melissa Multiparitite virus • Hybrid of a Boot Sector and Program viruses. • Infects program files and when the infected program is active it will affect the boot record
  • 8. Virus-Legal Issues of protection Grounds on which virus creation or distribution may be found to be illegal • Unauthorized Access Any kind of access without the permission E.g :Hacking • Unauthorized Modification Any kind of modification to the data without the permission of the User Eg. Email attacks
  • 9. Continued… Incitement • Includes making available viruses, virus code, information on virus creation, and virus engines. Denial of Service attacks • Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users.
  • 10. Continued.. • All such kind of attacks come under Cyber Crime i.e “unlawful acts wherein the computer is either a tool or target or both”. • Thus to control the Cyber Crime “Cyber Laws “ were introduced .
  • 11. Cyber Laws  The world 1st computer specific law was enacted in the year 1970 by the German State of Hesse in the form of „Data Protection Act, 1970’ with the advancement of cyber technology.  Indian parliament passed its “INFORMATION TECHNOLOGY ACT, 2000” on 17th October to have its exhaustive law to deal with the technology .
  • 12. IT ACT OF INDIA 2000  The Information Technology Act, 2000 aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means.  This ACT defines many CHAPTERS, which defines different kinds of punishments for different types of crime.
  • 13. IT ACT OF INDIA 2000 CHAPTER IX • Act talks about penalties and adjudication (preparing official judgment)for various offences. • The penalties for damage to computer systems etc. has been fixed as damages by way of compensation not exceeding Rs. 1,00,00,000 to affected persons.
  • 14. Continued…  Penalty : 2year prisonment or/and 2lack penalty  The Act talks of appointment of any officers not below the rank of a Director to the Government of India or an equivalent officer of state government.  Adjudicating Officer has been given the powers of a Civil Court.
  • 15. Protection mechanism • Anti-virus • Firewall • Recovery • Online Backup Data
  • 16. Handling Third Party Software • Third party software refers to programs that are developed by companies other than the company that developed the computer's operating system. • Eg. Windows programs developed by companies other than Microsoft are called third party programs.
  • 17. Continued..  The risk is not in code that internal developers have written, but in components provided by outside developers, whether open-source libraries or third-party toolkits.  There is an assumption that vendors and open-source developers have gone through the security checkpoints during the application development process, and that assumption is false.“  To secure their software, companies must first figure out which code components have become part of their code base
  • 18. Continued…  To analyze the software the developers and IT security teams need to do an application assessment .  They need to find the vulnerabilities in the software : through static analysis by monitoring the developer's support forum through an intelligence service that tracks changes to software.  The company can then make an informed
  • 19. Continued…. Binary only Source Publicly available e.g. downloadable "Software" Bilateral Agreements e.g. "Collaboration Agreements" Publicly available "Open Source" "Free Software"
  • 20. References • www.opensource.org • www.wiseGEEK.com • www.spamlaws.com • www.cyberlawsindia.net • Chieh-jen,Chao-Ching Wang,” A Scalable High-Performance Virus Detection Processor Against a Large Pattern Set for Embedded Network Security ” ,IEEE, pages 841-854, May 2012.