If a hardware or software maker finds a vulnerability in one of its products, how should it respond?

ANSWER PART 1 AND PART 2 BRIEFLY:

 

 

PART #1

 

4. the person who wrote the portion of OpenSSL code containing the Heartbleed vulnerability said the error slipped through because there weren’t enough eyes looking at the code for possible errors.  Because OpenSSL is open source, could a shortage of paid code checkers mean there might be more errors like Heartbleed. Why?

 

5.  If a hardware or software maker finds a vulnerability in one of its products, how should it respond?  Does it have a legal responsibility to warn its users?  Does it have an ethical responsibility to do so?  Why or Why not?

 

—————————————————————————————————————————————————————————————————————————————————————————————————————-

PART #2

 

Is it spying or just good management?

 

You can use the following questions as a guide for your posts. You don’t need to follow them verbatim and feel free to add any additional thoughts you may have. (bonus points)

 

Is it legal for employers to use these types of monitoring techniques? How do you feel about the ethics of employers using these techniques?

 

What are your feelings about having your communications monitored as an employee? Do you think you would use these techniques as a manager?  Are there any situations it would be absolutely necessary to use these techniques?

 

Free packet sniffing software can be found at www.wireshark.com

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total:

Last Completed Projects

# topic title discipline academic level pages delivered
6
Writer's choice
Business
University
2
1 hour 32 min
7
Wise Approach to
Philosophy
College
2
2 hours 19 min
8
1980's and 1990
History
College
3
2 hours 20 min
9
pick the best topic
Finance
School
2
2 hours 27 min
10
finance for leisure
Finance
University
12
2 hours 36 min