Organizations around the world, in every type of industry and market, are moving towards networks that are based on the Internet protocols. In addition, third-party commercial and open source software has become a critical element to these organizations and the infrastructure of networks, utilities, and services they rely upon to function. That means the software problems in these COTS software
... [Show full abstract] products can quickly cause significant difficulties for any organization. When such software problems have security implications, they are referred to as ”vulnerabilities.”