Protecting Software Systems
Protecting Software Systems
Types of Threats to Software Systems
- Malware, a malicious software that is not beneficial for the user’s system. It includes viruses, worms, spyware, and ransomware.
- Phishing, attempts to extract sensitive information by posing as a trustworthy source in an email or a website.
- Social engineering, which involves manipulation to trick others into revealing confidential information.
- Brute force attacks, trying numerous combinations until they find the correct one to gain access.
Risk Assessment and Planning
- Risk Assessment, invloves identifying and assessing potential threats and vulnerabilities to protect the software system.
- Contingency planning, readiness for unexpected events like cyber-attacks or hardware failure, helps in securing the data and software.
Physical Security Measures
- Biometric Security, this includes fingerprint scanning, retina scanners, and facial recognition which are hard to copy.
- Smart Cards, a card with a built-in microprocessor, used for secure transactions or access control.
- Security tokens, these are physical devices to gain access to an electronically restricted resource.
Software Security Measures
- Firewall, a security system that monitors and controls incoming and outgoing network traffic.
- Encryption, a secure method to protect data by changing it into unreadable code, which can only be read with a unique key.
- Antivirus software, detects and removes malicious software to keep systems safe.
- Password protection and Two-factor authentication (2FA), adds additional layer of security by requiring not only a password and username, but also something that only the user has on them.
Legislation
- Data Protection Act, that involves necessary protection of individuals’ data.
- Computer Misuse Act, which makes hacking and unauthorised access to computer material illegal.