Identify the benefits of FOSS
Less Vulnerability,
Threads & higher
Security
Mohamde Safras | 13
Less Vulnerability, Threads & higher
Security
 If we use FOSS we can reduce the vulnerabilities and threads and Hacking
attempts on servers are frequent, malware, Trojans and viruses are
commonplace and tools to help the hacker are readily available.
 No software is 100% immune from security vulnerabilities but the open source
process itself delivers superior security performance.
 The Open Source development model and inherent security of Linux mean
vastly improved protection from attack, and consequently less downtime and
maintenance costs.
Security Continue…
 Three reasons are often cited for FOSS’s better security record:
 Availability of source code
 Security focus, instead of user-friendliness
 Roots
Shared Development
Costs
Nayana | 10
Shared Development
Costs
• Cost investment for all the practices
• is greatest when the commercial or nonprofit organizations
High Quality
Kopi | 84
High Quality
 Most open source programs are with high quality.
 A software package created by a handful of developers.
 Using open source software also means that you are not
locked in to using a particular vendor's system that only
works with their other systems.
Availability of source
code
Anujah | 49
AVAILABILITY OF SOURCE CODE
Open source software is the fact that everybody has the right to modify
the source code.
The implications of this are that bugs can be easily fixed.
With closed source if there is A bug in certain software the user must
wait for A new release whereas in open source the code can be
altered and the bug can be fixed.
LOWER ACQUISITION
AND MAINTENANCE
COST
Arzath Areeff | 72
Lower total cost of ownership
 reduced dependence on software vendors
 open source software is not really free
Free$119.99
Reduced dependence on software
vendors
 Freedom
 maintenance and support
 Versions
 Long time supports
Easier to customize
 Install and configure
 Support forms available
 LOWER ACQUISITION AND MAINTENANCE COST
 http://www.computereconomics.com/article.cfm?id=1043
 OpenSourceEHRSystemsAppendixE.pdf
 LESS VULNERABILITY, THREADS & HIGHER SECURITY
 http://www.nrcfoss.org.in/resources/benefits-of-using-foss

More Related Content

PDF
Design and Analyze Secure Networked Systems - 7
PPT
70-272 Chapter10
PPTX
Powerpoint
PPT
Application'sand security
PDF
Dilsher idrees mustafa_6_a_vulnerabilities_study
PPTX
Antivirus software
PPTX
Abdulkarim 1 and 2
PPT
Ch08 Microsoft Operating System Vulnerabilities
Design and Analyze Secure Networked Systems - 7
70-272 Chapter10
Powerpoint
Application'sand security
Dilsher idrees mustafa_6_a_vulnerabilities_study
Antivirus software
Abdulkarim 1 and 2
Ch08 Microsoft Operating System Vulnerabilities

What's hot (20)

PPT
Virus part2
PPTX
Issues and precautions related to ict
PDF
Antivirus update reaction times of major antivirus vendors
PPTX
Computer virus and worms
PPTX
computer Virus
PPTX
Computer viruses
PPT
PPTX
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
PDF
Ceh v5 module 00 student introduction
PPTX
Installing and configuring computer System
PDF
On the impact of security vulnerabilities in the npm package dependency network
PDF
Virus & Worms(20120628)
PPTX
The Day We Infected Ourselves with Ransomware
PPT
PPT
It's Your Move: The Changing Game of Endpoint Security
PDF
Defending Servers - Cyber security webinar part 3
PPTX
Computer virus
PDF
Defending Workstations - Cyber security webinar part 2
Virus part2
Issues and precautions related to ict
Antivirus update reaction times of major antivirus vendors
Computer virus and worms
computer Virus
Computer viruses
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Ceh v5 module 00 student introduction
Installing and configuring computer System
On the impact of security vulnerabilities in the npm package dependency network
Virus & Worms(20120628)
The Day We Infected Ourselves with Ransomware
It's Your Move: The Changing Game of Endpoint Security
Defending Servers - Cyber security webinar part 3
Computer virus
Defending Workstations - Cyber security webinar part 2
Ad

Similar to Foss benifits (20)

PPT
Open source technology
PPSX
Open source vs cloased source
PPTX
Why is open source software is good for business
PPTX
Benefits of Using Open Source Technology for Web Development.pptx
PPTX
Types of software, advantages and disadvantages
PPTX
Advantages & Disadvantages (Open-Source vs. Proprietary Software)
PPTX
Why do People Prefer Using Open Source Software?
PDF
Linux and the Open Source- D Sarkar
PPTX
Open source software
PDF
Tiếng Anh công nghệ thông tin VHU Tuần 5
PPT
Fosss
PPTX
Software Security Assurance for Devops
PPTX
Software Security Assurance for DevOps
PPTX
Open source software
PDF
Infiltrating the Supply Chain Attack: Advanced Payload Delivery and Evasion T...
PPT
Open Source N Egovernance
PPT
open source solution for e-governance
PPTX
Open Source Software
PPT
Open Source Software - Part 1
PPTX
Scenario 2 - A medium-sized photographic and printing business
Open source technology
Open source vs cloased source
Why is open source software is good for business
Benefits of Using Open Source Technology for Web Development.pptx
Types of software, advantages and disadvantages
Advantages & Disadvantages (Open-Source vs. Proprietary Software)
Why do People Prefer Using Open Source Software?
Linux and the Open Source- D Sarkar
Open source software
Tiếng Anh công nghệ thông tin VHU Tuần 5
Fosss
Software Security Assurance for Devops
Software Security Assurance for DevOps
Open source software
Infiltrating the Supply Chain Attack: Advanced Payload Delivery and Evasion T...
Open Source N Egovernance
open source solution for e-governance
Open Source Software
Open Source Software - Part 1
Scenario 2 - A medium-sized photographic and printing business
Ad

Recently uploaded (20)

PDF
CloudStack 4.21: First Look Webinar slides
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Architecture types and enterprise applications.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Modernising the Digital Integration Hub
PPT
Geologic Time for studying geology for geologist
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Zenith AI: Advanced Artificial Intelligence
CloudStack 4.21: First Look Webinar slides
The influence of sentiment analysis in enhancing early warning system model f...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Architecture types and enterprise applications.pdf
Build Your First AI Agent with UiPath.pptx
Getting started with AI Agents and Multi-Agent Systems
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
sustainability-14-14877-v2.pddhzftheheeeee
Modernising the Digital Integration Hub
Geologic Time for studying geology for geologist
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Flame analysis and combustion estimation using large language and vision assi...
Chapter 5: Probability Theory and Statistics
Credit Without Borders: AI and Financial Inclusion in Bangladesh
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
TEXTILE technology diploma scope and career opportunities
NewMind AI Weekly Chronicles – August ’25 Week III
Benefits of Physical activity for teenagers.pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
Zenith AI: Advanced Artificial Intelligence

Foss benifits

  • 2. Less Vulnerability, Threads & higher Security Mohamde Safras | 13
  • 3. Less Vulnerability, Threads & higher Security  If we use FOSS we can reduce the vulnerabilities and threads and Hacking attempts on servers are frequent, malware, Trojans and viruses are commonplace and tools to help the hacker are readily available.  No software is 100% immune from security vulnerabilities but the open source process itself delivers superior security performance.  The Open Source development model and inherent security of Linux mean vastly improved protection from attack, and consequently less downtime and maintenance costs.
  • 4. Security Continue…  Three reasons are often cited for FOSS’s better security record:  Availability of source code  Security focus, instead of user-friendliness  Roots
  • 6. Shared Development Costs • Cost investment for all the practices • is greatest when the commercial or nonprofit organizations
  • 8. High Quality  Most open source programs are with high quality.  A software package created by a handful of developers.  Using open source software also means that you are not locked in to using a particular vendor's system that only works with their other systems.
  • 10. AVAILABILITY OF SOURCE CODE Open source software is the fact that everybody has the right to modify the source code. The implications of this are that bugs can be easily fixed. With closed source if there is A bug in certain software the user must wait for A new release whereas in open source the code can be altered and the bug can be fixed.
  • 12. Lower total cost of ownership  reduced dependence on software vendors  open source software is not really free Free$119.99
  • 13. Reduced dependence on software vendors  Freedom  maintenance and support  Versions  Long time supports
  • 14. Easier to customize  Install and configure  Support forms available
  • 15.  LOWER ACQUISITION AND MAINTENANCE COST  http://www.computereconomics.com/article.cfm?id=1043  OpenSourceEHRSystemsAppendixE.pdf  LESS VULNERABILITY, THREADS & HIGHER SECURITY  http://www.nrcfoss.org.in/resources/benefits-of-using-foss

Editor's Notes

  • #5: 01.Availability of source code: The availability of the source code for FOSS systems has made it easier for developers and users to discover and fix vulnerabilities, often before a flaw can be exploited. Many of the vulnerabilities of FOSS listed in Bugtraq were errors discovered during periodic audits and fixed without any known exploits. FOSS systems normally employ proactive rather than reactive audits. 02.Security focus, instead of user-friendliness: FOSS can be said to run a large part of the Internet25 and is therefore more focused on robustness and functionality, rather than ease of use. Before features are added to any major FOSS application, its security considerations are considered and the feature is added only if it is determined not to compromise system security. 03.Roots: FOSS systems are mostly based on the multi-user, network-ready Unix model. Because of this, they come with a strong security and permission structure. Such models were critical when multiple users shared a single powerful server—that is, if security was weak, a single user could crash the server, steal private data from other users or deprive other users of computing resources. Consequently, vulnerabilities in most applications result in only a limited security breach.
  • #9: Besides, it continually evolving in real-time as developers add and modify it, which means it can be better quality, more secure and less prone to bugs than proprietary systems, because it has so many users poring over it and weeding out problems.
  • #11: This means the code can be implemented in other pieces of software and adapted to changing environments.
  • #13: administration and support costs overshadow initial software license cost and annual maintenance fees--the costs that are minimized by open source
  • #14: most important advantage of open source software buyers must feel some level of dependence on proprietary software vendors Not necessary to accept new updates Ex Microsoft xp supports not available, apple forced to upgrade if they want to continue receiving vendor support Older versions of products continue to be supported through the open source community and third party support providers as long as there is demand in the marketplace for such support
  • #15: Small ones unable to install and configure without the support of experties