Skip to content

Identification Of Software Security Vulnerabilities

Classification and identification of software security vulnerabilities is not often easy and to facilitate it here I present a reference model, databases, metrics, and relationship between CVE, CVSS, CWE, CWSS, OWASP, and SANS standards. Many organizations and communities create and maintain a wide range of standards, databases, metrics, and classifications in order to identify, describe, publicize, and assess the severity of software vulnerabilities. Because of this plethora of entities and information, it is frequently difficult to understand the distinctions and relationships…

Read more
Software Security

Software Security Introduction

Software security is critical to keeping information secure and achieving the desired level of cybersecurity, and this can only be accomplished by implementing the appropriate security and specialized practices at all stages of the software development life cycle (SDLC). We are surrounded by interconnected computers (including embedded systems) that run software that can be exploited for unintentional or malicious use, causing serious damage to society or business. Network security is ineffective at reducing the risk of these threats, and software…

Read more
Utilities Industry For MVNO

Utilities Industry For MVNO

Utilities industry for MVNO (Mobile Virtual Network Operator) can be a nice market because it is less competitive than the Telecommunications market. Creating a specific specialization, MVNO can have a new and profitable revenue stream. MVNOs add value to the telecommunications industry, but they need to change their business model and take a more niche and targeted approach to alleviating the incredibly high competition in the markets in which they operate. The Utilities industry is a lucrative market that MVNOs…

Read more
Search