Protecting Software Systems
Protecting Software Systems
Firewalls
- A firewall is a network security system that observes and controls the incoming and outgoing network traffic based on predetermined security rules.
- Acts as a barrier between a trusted internal network and untrusted external networks, such as the internet.
- The firewall filters network traffic based on an organisation’s previously established security policies.
- Firewalls can be either hardware or software-based.
- A firewall can block unauthorized access to a system but can also provide a range of other services, like hiding the system from public view, or providing VPNs for secure remote access.
Antivirus Software
- Antivirus software helps protect a computer system against viruses, worms, spyware, adware, ransomware, and other forms of malicious or unwanted software.
- Antivirus software works by scanning files or directories for harmful software and helps to deter threats.
- Some versions can detect potentially harmful software behaviour.
- Most antivirus software acts as a background process, checking systems while they’re idle to avoid impacting performance.
- It’s important to regularly update antivirus software to protect against the most recent threats.
Patch Management
- Patch management is the process of handling updates of software applications to ensure operating systems and applications stay up to-date.
- Patching can fix bugs, close vulnerabilities, and provide enhanced features.
- Patches can be either automatic or manual depending on the system set up.
- Ignoring patches can leave a system vulnerable to attacks that take advantage of known issues.
User Access Controls
- User access controls determine who can access what within a network.
- Using strong passwords helps to protect accounts from unauthorised access.
- A good practice is to limit user permissions to only what they need to perform their roles.
- User access involves authentication (through passwords or biometrics) and authorisation (what level of access an authenticated user has).
- Regular audits can ensure that access is appropriately allocated.
Data Backups
- Data backups are crucial for protecting data against loss from threats like ransomware or physical damage to storage media.
- Backups should be encrypted and stored in a physically separate location to the original data.
- Regular testing of backups is important to ensure they can be successfully restored if needed.
- A good backup strategy will typically involve making regular, frequent backups and retaining several previous versions of data.