Protecting Software Systems

Protecting Software Systems

Types of Threats to Software Systems

  • Malware, a malicious software that is not beneficial for the user’s system. It includes viruses, worms, spyware, and ransomware.
  • Phishing, attempts to extract sensitive information by posing as a trustworthy source in an email or a website.
  • Social engineering, which involves manipulation to trick others into revealing confidential information.
  • Brute force attacks, trying numerous combinations until they find the correct one to gain access.

Risk Assessment and Planning

  • Risk Assessment, invloves identifying and assessing potential threats and vulnerabilities to protect the software system.
  • Contingency planning, readiness for unexpected events like cyber-attacks or hardware failure, helps in securing the data and software.

Physical Security Measures

  • Biometric Security, this includes fingerprint scanning, retina scanners, and facial recognition which are hard to copy.
  • Smart Cards, a card with a built-in microprocessor, used for secure transactions or access control.
  • Security tokens, these are physical devices to gain access to an electronically restricted resource.

Software Security Measures

  • Firewall, a security system that monitors and controls incoming and outgoing network traffic.
  • Encryption, a secure method to protect data by changing it into unreadable code, which can only be read with a unique key.
  • Antivirus software, detects and removes malicious software to keep systems safe.
  • Password protection and Two-factor authentication (2FA), adds additional layer of security by requiring not only a password and username, but also something that only the user has on them.

Legislation

  • Data Protection Act, that involves necessary protection of individuals’ data.
  • Computer Misuse Act, which makes hacking and unauthorised access to computer material illegal.