Read Sidebar 3-7 on pages 184-185 of the textbook. What are the pros and cons of making a system vulnerability public? Is it better to keep these vulnerabilities secret until they can controlled or should they be disseminated?
Read Sidebar 3-7 on pages 184-185 of the textbook. What are the pros and cons of making a system vulnerability public? Is it better to keep these vulnerabilities secret until they can controlled or should they be disseminated?