This research proposal focuses on the difficulties faced by users while updating security patches in their computer systems and aims to identify the best practices for automatic updating of software. It includes sections on introduction, literature review, and research methodology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE Best practices for automatic updating of software Name of the Student Name of the University Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE Executive Summary The notable objective of this paper is to focus on the difficulties faced by the users while updating the security patches in theircomputer systems. This research proposal will be having numeroussectionsandsubsections,eachofthemisverymuchimportanttofindthe effectiveness of the paper. The introduction unit will be having four sub sections stating the backgroundofthestudy,researchaimsandobjectives,researchquestionsandproblem statement. The following unit of the paper will be presenting the literature review. The paper will be concluding with the research methodology sections which will be again subdivided into sections such as research philosophy, research design, data collection procedure, sampling method used in the paper, ethical considerations of the paper, type of data analysis and the limitations of the study.
2BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE Table of Contents Chapter 1: Introduction....................................................................................................................3 1.2 Background of the study........................................................................................................3 1.2 Research Aims and Objectives..............................................................................................4 1.3 Research Questions................................................................................................................5 1.4 Problem Statement.................................................................................................................5 Chapter 2: Literature Review...........................................................................................................5 Chapter 3: Research Methodology..................................................................................................7 3.1 Research Philosophy..............................................................................................................8 3.2 Research Design....................................................................................................................9 3.3 Data Collection Process.........................................................................................................9 3.4 Sampling Method...................................................................................................................9 3.5 Ethical Consideration...........................................................................................................10 3.6 Data Analysis.......................................................................................................................10 3.7 Limitations of the study.......................................................................................................11 References......................................................................................................................................12
3BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE Chapter 1: Introduction The notable determination of this research proposal is to identify the best practices for automatic updating of the software so that the users of the software are happy as the security patches are installed quickly for the software. There are lots of issues associated with the automatic software update procedure such as the risks coming from IP spoofing, privacy and security threats during the automatic updating procedure,compatibility of thecomputer systemsand the security patches (Rac-Lubashevsky and Kessler 2016). Losing track of the changes in the software after the installation procedure and the slow installation of the security patches are the other significant issues associated with the use of the automatic updating procedure. The following unit of the paper will be discussing different aspects of the automatic software updating procedures and the impact of using security patches. 1.2 Background of the study The automatic software updating is very much beneficial for the users of the software as it helps them to deal with adverse conditions such as a security risk coming from a cyber-security attack like Ransomware. The digital safety of the system is maintained by updating the security patches(Neumannet al.2016). However, the automaticupdatingprocedure can have a significant negative impact on the installation procedure of the security patches (Jinet al. 2017). The updating procedure can be both manually selected by the users of the system at the same time it can be done automatically. The security patches are important not only to deal with the security issues but at the same time it can be said that vulnerabilities or the limitations of the softwarearealsoremovedaftertheinstallationproceduresecuritypatches(Mitraand
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE Ransbotham 2015). The bugs in the software can be also removed using the security patches. The performance or the usability of the software can be improved to a huge extent using the latest security patches which are released by the primary stakeholders of the software. There are numerous techniques which are applied by the users of the software for automatically updating their software such as the use of the software updater tools such as the Ninite (Liska 2016). The automatic updating options are generally provided by most of the software all around the world. The application stores of each system provides the option of automatically updating the software but there are few constraints of the automatic software updating procedure such as the disruptions in the programs which are already running in the system or the programs which are scheduled to run in the coming hours (Li and Paxson 2017). All the processes which are running the system can get disrupted due to the automatic updating of the software. The following unit of the paper will be discussing the aims and objectives of this research proposal. 1.2 Research Aims and Objectives The objectives and the aim of this research paper are as follows: ď‚·To present and evaluate the different ways for the automatic updating of the software. ď‚·To understand the issues faced by the users of the software regarding the automatic installation procedure of the software. ď‚·To understand the reason behind the huge amount of time required to install the security patches in acomputer system. The succeeding segment of the paper will be focusing on the research question of this paper.
5BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE 1.3 Research Questions The research questions for this proposal are as followings: ď‚·What are the difficulties faced by the users regarding the automatic software updating procedure? ď‚·How can the security patches ensure the security of the system considering the new advanced techniques used by the cybercriminals and the ethical hackers? ď‚·What are the main reasons behind the delay in the installation procedure of the security patches for software? ď‚·What are the different ways to install the security patches at a faster rate? The consequent unit of this research proposal is to concentrate on the problem statement of this research paper. 1.4 Problem Statement There are different types of practices for the automatic updating of the software, this leads to complexities such as delayed installation procedure of the security patches. This paper will be identifying the best practice of automatic software updating. Chapter 2: Literature Review As discussed byVaniea and Rashidi (2016), the automatic updating procedure of the software can be done using both the mobile data as well as Wi-Fi. The updating procedure of the software can be managed entirely by the users as there are options which can enable the users to schedule their updating procedure according to their preferences (Fleischmannet al. 2016). The researcher of the paper stated that thecomputer systems cango through huge changes during or after the automatic up-gradation procedure of the software. During this procedure the existing
6BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE running programs may get disrupted, which is the main reason behind scheduling the automatic updating procedure in the free time of the users (Arcangeli, Boujbel and Leriche 2015). The researcher of this paper focuses on the importance of patch management incomputer systems. The researcher stated that the use of the security patches may be helpful for the users as the security patches can act as the shield during any cybersecurity attack from the network (Benson, Prevost and Rad 2016). The advantage of this paper is that it focuses on both the advantages and the constraints of the automatic updating the software, however, the main limitation of the paper is that it do not focuses on any particular case study to understand the topic in a more detailed manner. As stated byStegeret al. (2018), the security patches and the software updates are very much beneficial for the users as it helps them to secure the system from numerous cyber-attacks. The researcher of that paper stated that the automatic updating of the software is very much beneficial for the users as it allows them to deal with the security attacks from the ethical hackers and the cybercriminals (Abeet al. 2016). The automatic updating of the software enables the users to deal with the installation procedure of the security patches. The installation of the security patches is a huge source of concern for the users, the automatic updating facility enables the users to get rid of this concern (Calcagnoet al. 2015). The researcher also stated that the automatic updating of the software can help to secure the source codes of the operating system. The researcher stated that the changes after the automatic updating of the software have to be tracked professionally by the users so that they can understand the impact of an automatic software update. The researcher stated that the users of thesoftware and the computer systems faces serious challenges regarding the installation of the security patches such as scanning the devices for the current update and select the security patch according to the compatibility of the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE device (Clarkeet al.2016). The researcher stated that the servicing stack update before the manual software updating procedure is the other problem for the users which is not there in the automatic updating procedure (Avery and Spafford 2017). The paper have described all the probable benefits of automatic updating procedure, the most significant limitation of the paper is that it Thus the paper helps in understanding that the automatic updating of the software is much more facilitative than the manual dating the procedure. As mentioned byStankovic et al. (2019), users face huge complexities while installing the security patches of software. The researcher of this paper classified the complexities into numerous categories which are very much useful for the readers to understand the topic in a detailedmanner such asthelegacyvulnerabilitiessuch asthecompatibilityissues. The researcher stated that operations of the devices may get disrupted due to the manual installation procedure of the security patches (Dumitras 2017). The concept of security patch management has been explained briefly in this paper with the help of a case study by the researcher. According to the researcher, patch education can be very much useful for the users of the computer systemsas it will help them to deal with difficulties of installing security patches (Sarabiet al. 2017). The researcher stated that the use of the heterogeneous OS platform can be the best practise for managing the security patches. The detailed patch deployment is very much important for maintaining the security of thecomputer systemsas stated by the researcher. The most significant contribution of the paper is that it focuses on technical difficulties of the installation procedure of the security patches, there are negligible limitations of this paper. The following unit of the proposal will be presenting the research methodology.
8BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE Chapter 3: Research Methodology This unit of the paper will be focusing on the empirical analysis techniques which will be followed in this research paper. The research methodology unit of the paper will be having numerous subunits or subsections and each of the subsections will be having its own significance to enhance the effectiveness of this research paper so that it can be considered in the future projects. The research methodology unit of this paper will be having the following segments such as the followings: ď‚·Research philosophy and research design. ď‚·Thetypeof investigationprocedurealongwiththereasonbehindtheusing that investigation procedure. ď‚·The data collection method of the research along with its justification. ď‚·The sampling method of the research along with the reason behind choosing the sampling method. ď‚·Ethical issues associated with the research. ď‚·Plan for the data analysis. ď‚·Limitation of this research. 3.1 Research Philosophy There are different types of philosophies which are generally used in the research proposals such as the positivism and interpretivism. The interpretivism philosophy is very much useful for the research proposal which has primary data collection procedure and the positivism philosophy are used in the projects which relies entirely on the scientific evidence. The positivism investigation theory will not be considered in this research paper as this paper will be
9BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE considering only secondary data collection procedure from peer-reviewed scholarly articles. Thus the paper will be considering the interpretivism philosophy as the data analysis will be done on the peer-reviewed journals. 3.2 Research Design Three different categories of research design which are usually used in the research proposal such as the exploratory research design, explanatory research design and the descriptive research design. The explanatory research design is used in the research proposal which focuses on a topic which is not focused by any other researchers, the exploratory research designs are used in research proposals which needs clarifying an issue using theoretical or hypothetical ideologies. The descriptive research designs are used in the research proposal where data are collected from primary resources. Considering all the three different types of research designs it can be said that the exploratory research designs will be considered in this research proposal. 3.3 Data Collection Process There are two different categories of data collection procedure for the research paper such as the primary data collection and the secondary data collection procedure. The primary data collection procedure is the process of collection of data from personal interview, survey or group discussion. The secondary data collection procedure is the procedure of collection of data from secondary sources such as the peer-reviewed scholarly articles. Both the two types of data collection procedure have its own significance in providing reliability to the research proposal. Considering both the two types of data collection procedures it can be said that this research proposal will be considering the secondary data collection.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE 3.4 Sampling Method There are two different types of sampling method used in the research proposal such as the probabilistic method and the non-probabilistic method. The probabilistic method is mostly suited for research proposals which have primary data collection procedure and non-probabilistic method are generally used in the research proposals which have secondary data collection procedures.Testingstrategiesareimportantforbothsamplingmethods.Consideringthe description of the two types of sampling methods it can be said that the non-probabilistic sampling method will be very much useful for this project. The non-probabilistic sampling does not rely on the subjective judgment of the researchers who work are considered as a secondary collection plan. 3.5 Ethical Consideration Like every other research proposal, this paper also has few ethical considerations which have to be understood in the first place before finding the effectiveness of the paper. The data which will be collected from the secondary resources must not be altered or modified under any circumstances. The other ethical considerations of this paper is to maintain the confidentiality of the data which has to be maintained. 3.6 Data Analysis There are two types of data analysis techniques which are used in the research proposals such as the qualitative data analysis technique and the quantitative data analysis technique. The qualitative data analysis is defined as analyzing technique which is used to analyze data numerical data and quantitative data analysis technique is applied on data which does not have any numerical value. The qualitative data analysis is done using statistical tools such as the
11BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE SPSS, Microsoft Excel, SAS and Minitab. Considering the data collection procedure of this research paper it can be said that the quantitative data analysis technique can be hugely beneficial for this research paper as the data analysis does not involve any numeric calculation. 3.7 Limitations of the study Like every other proposal, there are few limitations of this paper as well such as the financial management of the project. The other complexity of constraint of this paper is the management of the time which is required for each of the phases of this research. The selection of the data collection procedure and the data analysis is also a significant challenge for the researchers of this proposal. The other limitation of this research paper is the selection of the peer-reviewed journals as there are continuous developments regarding the automatic of the software updates and delay in the installation procedure if the security patches.
12BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE References Abe, S., Fujimoto, M., Horata, S., Uchida, Y. and Mitsunaga, T., 2016, September. Security threats of Internet-reachable ICS. In2016 55th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE)(pp. 750-755). IEEE. Arcangeli, J.P., Boujbel, R. and Leriche, S., 2015. Automatic deployment of distributed software systems: Definitions and state of the art.Journal of Systems and Software,103, pp.198-218. Avery, J. and Spafford, E.H., 2017, May. Ghost patches: Fake patches for fake vulnerabilities. In IFIP International Conference on ICT Systems Security and Privacy Protection(pp. 399-412). Springer, Cham. Benson, J.O., Prevost, J.J. and Rad, P., 2016, April. Survey of automated software deployment for computational and engineering research. In2016 Annual IEEE Systems Conference (SysCon) (pp. 1-6). IEEE. Calcagno, C., Distefano, D., Dubreil, J., Gabi, D., Hooimeijer, P., Luca, M., O’Hearn, P., Papakonstantinou, I., Purbrick, J. and Rodriguez, D., 2015, April. Moving fast with software verification. InNASA Formal Methods Symposium(pp. 3-11). Springer, Cham. Clarke, N., Li, F., Furnell, S., Stengel, I. and Ganis, G., 2016. Information security and practice: The user's perspective. InICCWS 2016 11th International Conference on Cyber Warfare and Security: ICCWS2016(p. 81). Academic Conferences and publishing limited. Dumitras, T., 2017, March. Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State. InPassive and Active Measurement: 18th
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings (Vol. 10176, p. 113). Springer. Fleischmann, M., Amirpur, M., Grupp, T., Benlian, A. and Hess, T., 2016. The role of software updates in information systems continuance—An experimental study from a user perspective. Decision Support Systems,83, pp.83-96. Jin, D., Li, Z., Hannon, C., Chen, C., Wang, J., Shahidehpour, M. and Lee, C.W., 2017. Toward a cyber resilient and secure microgrid using software-defined networking.IEEE Transactions on Smart Grid,8(5), pp.2494-2504. Li, F. and Paxson, V., 2017, October. A large-scale empirical study of security patches. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 2201-2215). ACM. Liska, A., 2016. Issues in NTP Security. InNTP Security(pp. 23-35). Apress, Berkeley, CA. Mitra, S. and Ransbotham, S., 2015. The effects of vulnerability disclosure policy on the diffusion of security attacks.Information Systems Research,26(3), pp.565-584. Neumann, M.A., Bach, C.T., Miclaus, A., Riedel, T. and Beigl, M., 2016, November. Always- On Web of Things Infrastructure using Dynamic Software Updating. InProceedings of the Seventh International Workshop on the Web of Things(pp. 5-10). ACM. Rac-Lubashevsky, R. and Kessler, Y., 2016. Dissociating working memory updating and automaticupdating:Thereference-backparadigm.JournalofExperimentalPsychology: Learning, Memory, and Cognition,42(6), p.951.
14BEST PRACTICES FOR AUTOMATIC UPDATING OF SOFTWARE Sarabi, A., Zhu, Z., Xiao, C., Liu, M. and DumitraĹź, T., 2017, March. Patch me if you can: A studyontheeffectsofindividualuserbehaviorontheend-hostvulnerabilitystate.In International Conference on Passive and Active Network Measurement(pp. 113-125). Springer, Cham. Stankovic, J.A., Le, T., Hendawi, A. and Tian, Y., 2019. Hardware/Software Security Patches for Internet of Trillions of Things.arXiv preprint arXiv:1903.05266. Steger, M., Boano, C.A., Niedermayr, T., Karner, M., Hillebrand, J., Roemer, K. and Rom, W., 2018. An Efficientand Secure AutomotiveWirelessSoftware Update Framework.IEEE Transactions on Industrial Informatics,14(5), pp.2181-2193. Vaniea, K. and Rashidi, Y., 2016, May. Tales of software updates: The process of updating software. InProceedings of the 2016 chi conference on human factors in computing systems(pp. 3215-3226). ACM.