SlideShare a Scribd company logo
1 of 15
Identify the benefits of FOSS
Less Vulnerability,
Threads & higher
Security
Mohamde Safras | 13
Less Vulnerability, Threads & higher
Security
 If we use FOSS we can reduce the vulnerabilities and threads and Hacking
attempts on servers are frequent, malware, Trojans and viruses are
commonplace and tools to help the hacker are readily available.
 No software is 100% immune from security vulnerabilities but the open source
process itself delivers superior security performance.
 The Open Source development model and inherent security of Linux mean
vastly improved protection from attack, and consequently less downtime and
maintenance costs.
Security Continue…
 Three reasons are often cited for FOSS’s better security record:
 Availability of source code
 Security focus, instead of user-friendliness
 Roots
Shared Development
Costs
Nayana | 10
Shared Development
Costs
• Cost investment for all the practices
• is greatest when the commercial or nonprofit organizations
High Quality
Kopi | 84
High Quality
 Most open source programs are with high quality.
 A software package created by a handful of developers.
 Using open source software also means that you are not
locked in to using a particular vendor's system that only
works with their other systems.
Availability of source
code
Anujah | 49
AVAILABILITY OF SOURCE CODE
Open source software is the fact that everybody has the right to modify
the source code.
The implications of this are that bugs can be easily fixed.
With closed source if there is A bug in certain software the user must
wait for A new release whereas in open source the code can be
altered and the bug can be fixed.
LOWER ACQUISITION
AND MAINTENANCE
COST
Arzath Areeff | 72
Lower total cost of ownership
 reduced dependence on software vendors
 open source software is not really free
Free$119.99
Reduced dependence on software
vendors
 Freedom
 maintenance and support
 Versions
 Long time supports
Easier to customize
 Install and configure
 Support forms available
 LOWER ACQUISITION AND MAINTENANCE COST
 http://www.computereconomics.com/article.cfm?id=1043
 OpenSourceEHRSystemsAppendixE.pdf
 LESS VULNERABILITY, THREADS & HIGHER SECURITY
 http://www.nrcfoss.org.in/resources/benefits-of-using-foss

More Related Content

What's hot

Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
makanaya
 
Antivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendorsAntivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendors
UltraUploader
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Billiyan
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Neeraj Bhandari
 

What's hot (20)

#1
#1#1
#1
 
Virus part2
Virus part2Virus part2
Virus part2
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
Antivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendorsAntivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendors
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
computer Virus
computer Virus computer Virus
computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Ceh v5 module 00 student introduction
Ceh v5 module 00  student introductionCeh v5 module 00  student introduction
Ceh v5 module 00 student introduction
 
Installing and configuring computer System
Installing and configuring computer SystemInstalling and configuring computer System
Installing and configuring computer System
 
On the impact of security vulnerabilities in the npm package dependency network
On the impact of security vulnerabilities in the npm package dependency networkOn the impact of security vulnerabilities in the npm package dependency network
On the impact of security vulnerabilities in the npm package dependency network
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)
 
The Day We Infected Ourselves with Ransomware
The Day We Infected Ourselves with RansomwareThe Day We Infected Ourselves with Ransomware
The Day We Infected Ourselves with Ransomware
 
virus
virusvirus
virus
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Computer virus
Computer virusComputer virus
Computer virus
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 

Similar to Foss benifits

Open source technology
Open source technologyOpen source technology
Open source technology
Rohit Kumar
 
Open source vs cloased source
Open source vs cloased sourceOpen source vs cloased source
Open source vs cloased source
thejacksrd
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
Rocket11986
 
open source solution for e-governance
open source solution for e-governanceopen source solution for e-governance
open source solution for e-governance
vikram singh
 
Scenario 2 - A medium-sized photographic and printing business
Scenario 2 - A medium-sized photographic and printing businessScenario 2 - A medium-sized photographic and printing business
Scenario 2 - A medium-sized photographic and printing business
hanimhussein_
 

Similar to Foss benifits (20)

Open source technology
Open source technologyOpen source technology
Open source technology
 
Open source vs cloased source
Open source vs cloased sourceOpen source vs cloased source
Open source vs cloased source
 
Why is open source software is good for business
Why is open source software is good for businessWhy is open source software is good for business
Why is open source software is good for business
 
Benefits of Using Open Source Technology for Web Development.pptx
Benefits of Using Open Source Technology for Web Development.pptxBenefits of Using Open Source Technology for Web Development.pptx
Benefits of Using Open Source Technology for Web Development.pptx
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
 
Advantages & Disadvantages (Open-Source vs. Proprietary Software)
Advantages & Disadvantages (Open-Source vs. Proprietary Software)Advantages & Disadvantages (Open-Source vs. Proprietary Software)
Advantages & Disadvantages (Open-Source vs. Proprietary Software)
 
Why do People Prefer Using Open Source Software?
Why do People Prefer Using Open Source Software?Why do People Prefer Using Open Source Software?
Why do People Prefer Using Open Source Software?
 
Linux and the Open Source- D Sarkar
Linux and the Open Source- D SarkarLinux and the Open Source- D Sarkar
Linux and the Open Source- D Sarkar
 
Open source software
Open source softwareOpen source software
Open source software
 
Fosss
FosssFosss
Fosss
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
 
Open source software
Open source software Open source software
Open source software
 
open source solution for e-governance
open source solution for e-governanceopen source solution for e-governance
open source solution for e-governance
 
Open Source N Egovernance
Open Source N EgovernanceOpen Source N Egovernance
Open Source N Egovernance
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
Open Source Software - Part 1
Open Source Software - Part 1Open Source Software - Part 1
Open Source Software - Part 1
 
Scenario 2 - A medium-sized photographic and printing business
Scenario 2 - A medium-sized photographic and printing businessScenario 2 - A medium-sized photographic and printing business
Scenario 2 - A medium-sized photographic and printing business
 
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
 
Open Source ETL
Open Source ETLOpen Source ETL
Open Source ETL
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Foss benifits

  • 2. Less Vulnerability, Threads & higher Security Mohamde Safras | 13
  • 3. Less Vulnerability, Threads & higher Security  If we use FOSS we can reduce the vulnerabilities and threads and Hacking attempts on servers are frequent, malware, Trojans and viruses are commonplace and tools to help the hacker are readily available.  No software is 100% immune from security vulnerabilities but the open source process itself delivers superior security performance.  The Open Source development model and inherent security of Linux mean vastly improved protection from attack, and consequently less downtime and maintenance costs.
  • 4. Security Continue…  Three reasons are often cited for FOSS’s better security record:  Availability of source code  Security focus, instead of user-friendliness  Roots
  • 6. Shared Development Costs • Cost investment for all the practices • is greatest when the commercial or nonprofit organizations
  • 8. High Quality  Most open source programs are with high quality.  A software package created by a handful of developers.  Using open source software also means that you are not locked in to using a particular vendor's system that only works with their other systems.
  • 10. AVAILABILITY OF SOURCE CODE Open source software is the fact that everybody has the right to modify the source code. The implications of this are that bugs can be easily fixed. With closed source if there is A bug in certain software the user must wait for A new release whereas in open source the code can be altered and the bug can be fixed.
  • 12. Lower total cost of ownership  reduced dependence on software vendors  open source software is not really free Free$119.99
  • 13. Reduced dependence on software vendors  Freedom  maintenance and support  Versions  Long time supports
  • 14. Easier to customize  Install and configure  Support forms available
  • 15.  LOWER ACQUISITION AND MAINTENANCE COST  http://www.computereconomics.com/article.cfm?id=1043  OpenSourceEHRSystemsAppendixE.pdf  LESS VULNERABILITY, THREADS & HIGHER SECURITY  http://www.nrcfoss.org.in/resources/benefits-of-using-foss

Editor's Notes

  1. 01.Availability of source code: The availability of the source code for FOSS systems has made it easier for developers and users to discover and fix vulnerabilities, often before a flaw can be exploited. Many of the vulnerabilities of FOSS listed in Bugtraq were errors discovered during periodic audits and fixed without any known exploits. FOSS systems normally employ proactive rather than reactive audits. 02.Security focus, instead of user-friendliness: FOSS can be said to run a large part of the Internet25 and is therefore more focused on robustness and functionality, rather than ease of use. Before features are added to any major FOSS application, its security considerations are considered and the feature is added only if it is determined not to compromise system security. 03.Roots: FOSS systems are mostly based on the multi-user, network-ready Unix model. Because of this, they come with a strong security and permission structure. Such models were critical when multiple users shared a single powerful server—that is, if security was weak, a single user could crash the server, steal private data from other users or deprive other users of computing resources. Consequently, vulnerabilities in most applications result in only a limited security breach.
  2. Besides, it continually evolving in real-time as developers add and modify it, which means it can be better quality, more secure and less prone to bugs than proprietary systems, because it has so many users poring over it and weeding out problems.
  3. This means the code can be implemented in other pieces of software and adapted to changing environments.
  4. administration and support costs overshadow initial software license cost and annual maintenance fees--the costs that are minimized by open source
  5. most important advantage of open source software buyers must feel some level of dependence on proprietary software vendors Not necessary to accept new updates Ex Microsoft xp supports not available, apple forced to upgrade if they want to continue receiving vendor support Older versions of products continue to be supported through the open source community and third party support providers as long as there is demand in the marketplace for such support
  6. Small ones unable to install and configure without the support of experties