Pro? jsou hacke?i, ?ervi a viry užite?ní pro bezpe?nost IT
?lánek studenta v Harvard Law Review.
Exploitation of security holes prompts users and vendors to close those holes, vendors to emphasize security in system development, and users to adopt improved security practices. This constant strengthening of security reduces the likelihood of a catastrophic attack -- one that would threaten national or even global security [...] Current federal law, however, does not properly value such strategic goals.