Floss in Cadastre and Land Registration



Download 1,04 Mb.
Pdf ko'rish
bet17/96
Sana29.06.2021
Hajmi1,04 Mb.
#104118
1   ...   13   14   15   16   17   18   19   20   ...   96
Bog'liq
i1447e

Open-source and security

At first sight being “Open“ seems to contradict security, because in the physi-

cal world we are used to locking things away to prevent them from being stolen. 

Thus proprietary code – that is itself essentially locked away – would also appear 



Proprietary motivation: Make Money

Open Source motivation: Solve Problem

Development team

develops software

beta version release

for beta tester

beta tester reports errors to

development team

development team

reproduces the error

development team reports to

the product management

development team solves

problem after OK from pm

Product is launched

Market analysis

Problem is identified

new version is released

Improved code is

published in the Internet

Participators find errors and

solve the problem

Internet as communication

pool and distribution media

Publish                    Code

Software development team

solves problem

Figure 2.1: Proprietary and open-source development models (Christl, 2008).



11

be more secure because none can look into its inner workings. But one of the very 

first paradigms of digital security says that security cannot be achieved by obscur-

ity. Instead, all algorithms, architectures and concepts required to secure things 

must be open to the scrutiny of as many eyes as possible. This will ensure that they 

will get tested and verified by as many experts and in as many different settings as 

possible. Additionally it would not make any sense at all to try to lock away all 

 protocols, code, software and architectures as “secret“ because then no one can 

actually use and implement them. The only way out of this deadlock is to improve 

the software and architectures to the point that it becomes very hard to break. 

This is exactly how security in the digital world works. All the encryption protocols 

that form the core security layer of the Internet are based on open-source models. 

Real security has to stand up against being completely and thoroughly transpar-

ent. Only by opening up all processes to the scrutiny of as many participants as 

possible, a reliable security system can be built.

Proprietary black box security systems might be hard to break to start with. But 

up to now in history every single security system ever has sooner or later been bro-

ken. Therefore the most important issue of digital security is to know when it has 

been compromised so that counter measures can be taken. For that reason all ma-

jor  security systems that are in common use nowadays are based on open-source 

models. This does not mean that proprietary software can by definition not be 

 secure because it can implement the same open-source algorithms, which is 

 exactly what happens.

One example for geospatial open-source adoption in a high security domain is 

the US Department of Defense (DoD). It was one of the major initial supporters of 

 geospatial Open-Source including the initial development of GRASS (the Geo-

graphic Resource and Analysis Support System). With the uptake of proprietary 

software in the 80s and 90s and the general need to reduce costs, new business 

models emerged and the DoD turned to so called CotS (Commercial off the Shelf) 

software. The hope was to be able to reduce the TCO (total cost of ownership) 

by  not developing software in-house but to rely on external sources. Recent 

 studies conducted by the DoD evaluated the results of this strategy and show that 

the open-source model is not inferior to the proprietary model from a  financial 

perspective and that it is definitely superior with respect to security. As a result the 

DoD is shifting its focus again and has changed its documents accordingly (DoD, 

2009) to allow the use of open-source in tenders, stating that open-source and 

proprietary software can synonymously be called “commercial software“.


Download 1,04 Mb.

Do'stlaringiz bilan baham:
1   ...   13   14   15   16   17   18   19   20   ...   96




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish