Chapter 3. Proper and Ethical Disclosure
Different points of view pertaining to vulnerability disclosure
The evolution and pitfalls of vulnerability discovery and reporting procedures
CERT’s approach to work with ethical hackers and vendors
Full Disclosure Policy (RainForest Puppy Policy) and how it differs between CERT and OIS’s approaches
Function of the Organization for Internet Safety (OIS)
For years customers have demanded operating systems and applications that provide more and more functionality. Vendors have scrambled to continually meet this demand while attempting to increase profits and market share. The combination of the race to market and keeping a competitive advantage has resulted in software going to the market containing many flaws. ...
Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.