DiscoverComputing and Information TechnologyReducing the Underlying Risk – Trustworthy Software
Reducing the Underlying Risk – Trustworthy Software

Reducing the Underlying Risk – Trustworthy Software

Update: 2016-10-17
Share

Description

A recurrent theme of exploits and attacks on ICT systems is a root cause resulting from software weaknesses, with certain risks (e.g. Buffer Overflows) recurring on a depressingly frequent basis.

In this talk, Ian Bryant covers the Trustworthy Software approach, which is intended to be a proactive management system to mitigate many frequently occurring risks.

The session was part of Secure South West 7 at Plymouth University on 5 October 2016. [(CC) BY-NC-SA 2.0 UK]
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Reducing the Underlying Risk – Trustworthy Software

Reducing the Underlying Risk – Trustworthy Software

Steven Furnell