Should the design cycle of new products include an analysis of security vulnerabilities?

4300 pts.
Tags:
Black Hat
product development
Security
Security accessment

Black Hat 2013 was a tension filled affair.In addition to National Security Agency Director General Keith B. Alexander defending U.S. surveillance of American citizens, claiming it's a necessity in a world threatened by what he called "terrorists among us," SeungJin "Beist" Lee showed attendees the possibilities of another sort of surveillance: how cameras and microphones on smart TVs can be turned into state-of-the-art snooping devices by malicious hackers.Other sessions focused on the vulnerability of embedded control devices in factory settings.This raises the question, should we change the design cycle of new products to include an overview and repair of security vulnerabilities, even though this may add costs and push out release dates?

Answer Wiki

Thanks. We'll let you know when a new response is added.

It sounds good on paper but it’ll never happen.

Features and general expediency will always trump security. As we’re seeing with so many – especially the younger generation – privacy is no longer coveted so we are, in effect, reaping exactly what we’re sowing.

Discuss This Question: 1  Reply

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • TomLiotta
    Since consumer concerns over personal security can cause decisions against purchases, I'd say that security impacts ought to be included already. In that sense, no, a "change" wouldn't be needed. But experience says it's commonly not a major concern of designers; so, yes, processes should be changed to include them. -- Tom
    125,585 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following