logo

Software Security: Importance, Techniques and Limitations

This paper presents the current developments in software security, including malware detection, software process maturity, and runtime software controls, as well as the advantages and disadvantages of software security in the contemporary world.

9 Pages2795 Words469 Views
   

Added on  2023-05-29

About This Document

This paper focuses on the importance of software security, techniques to ensure security, and limitations associated with it. It covers topics such as advanced malware detection, software process maturity, code scanning, runtime software controls, and general advantages and disadvantages of software security.

Software Security: Importance, Techniques and Limitations

This paper presents the current developments in software security, including malware detection, software process maturity, and runtime software controls, as well as the advantages and disadvantages of software security in the contemporary world.

   Added on 2023-05-29

ShareRelated Documents
Abstract
The foremost determination of the
paper is to focus on the importance of the
software security in the software
development life cycle. The software’s
which deals with sensitive data should be
arranged and managed in every phase of the
cycle so that the reliability and the
consistence of the data are maintained. The
technological enhancement has both
advantages and drawbacks, which is the
main reason that security of the software
should be focused on. The technological
advancements are the chief reason behind
the security threats associated to the
software’s. The extensive development in
the field of software technology is also one
of the reasons behind the software security.
The paper will be focusing on a thorough
examination of the literature works, the
latest developments of the software security
will be stated in this paper. The paper will
be highlighting the issues associated with
software security such as the detection of the
malware, software security control
measures, software process maturity, run
time software controls and the benefits and
limitations of the software safety.
Introduction
The prime determination of this unit
of the paper is to focus on the concept of
software security. Software security is
defined as the type of concept which is
needed to ensure the security of the software
from internal and external threats which
have the capacity to alter the data and harm
the integrity of the software. The attacks
coming from the malicious activities and the
hackers are the main reason behind the need
for the software security controls [1]. There
are three probable aspects of software
security such as the accessibility,
authentication and integrity. Security
software is defined as the type of software
which are needed to ensure that the network
or the particular software is free from the
internal and the external threats. All the
security issues associated to the software
falls under this category. The objective and
the responsibility of the software security
engineer are to focus on the security issues
associated to the software or the probable
threats from which the software might get
negatively affected [1]. The different types
of privacy and security software such as the
anti key loggers, cryptographic, anti-virus
software access control, anti-spyware and
anti-malware. The security risks of a
1
Software Security: Importance, Techniques and Limitations_1
computer may arise from the unpatched
operating systems, insecure computer
activities and misconfigured software’s. The
security threats associated to software are
the Trojan horse, privilege escalation, spam,
virus, worms, rootkits and adware [1]. The
safety and security of a computer is very
much needed so that the system can be
saved from the unwanted security threats.
The security of a computer will be ensuring
the protection of the computer as well as the
software installed in it.
The extensive development in the field of
information technology has resulted in the
growth of the cyber security communities
which works for the security and safety of
the software [2]. The compatibility issues
associated with software can also be
significantly minimized with the help of this
community. The developments in the field
of cyber security has guided us to
understand the advancements of the security
controls as well as provide idea about the
future development in this field [2]. The
current developments in the field of cyber
security have vgiven rise to software such as
DevOps coding. Strategies are adopted by
the cyber security communities to deal with
the security threats of the software with the
help of specific methods and techniques,
each dealing with specific kinds of risks.
The inefficiency of the back e3nd coding is
also a security concern, this also falls under
the category of the cyber security
communities [2]. The paper will be focusing
on the recent developments in this field and
also on the literature works. This will be
beneficial to understand the role of cyber
security considering the cyber security
threats.
Advanced Malware Detection
The advanced programming
technique is the other concern of software
security. The main objective of the cyber
security communities is the advanced
programming techniques, as exploitable
virus can be rapidly spread by the cyber
criminals which cannot be detected with the
help of the non-trivial codes. The technique
of malware identification is stated the figure
below [3].
Classification of Malware Detection
2
Software Security: Importance, Techniques and Limitations_2
The conventional malware detection
techniques were created on the application
code to the signatures but the latest
techniques considers the run time activities
as the measurement of the software security
[2]. It can be understood that every business
organization which deals with sensitive data
should be anticipating different types of
security issues so that they can achieve the
desired results. Cyber metric equipment’s
are used in the recent times for the
behavioral investigations of the software.
The absence of the cybernetic settings is
very much dangerous for the computer
systems [5].
In the recent times, machine learning
techniques are being applied to deal with the
cyber security issues such as the malware.
Efficiencies of the logarithms is improved to
a great extent. Continuous presences of the
complications associated to the software are
also detected with the help of these
developments. However it is also found the
possibilities of complete removal of the
malware is also very much difficult [5].
Advanced malware protection depends upon
the malware sand box to prevent the
distribution of the malicious documents.
The evasion approach of a malware depends
upon the following approaches:
Stalling delays: Malware generally
infects the computer system for a
maximum of 10 minutes.
User action need: The activity of the
malware starts only after any activity
of the users.
Suspended activities: The malware
helps in suspending any kinds of
malicious actions when it operates
with in a sand box. It has the
capability to modify the codes with
the other applications. Downloading
the additional codes and developing
the tenacity is the other activities of
the malware. Malware relocates
cross wise with in a network and
connect to the C & C servers.
Fragmentation: Malware can divide
itself into numerous fragments and
perform activities accordingly [6].
Return Oriented Programming
(ROP) evasion: The modifications of
the codes have no effect on the
malware. The adjustments of the
stack contents which sets the
memories address which are directed
to be executed afterward.
Rootkits: The lower strata of the
operating system is the home of the
malicious codes as the sand box tools
are unable to reach that spot.
3
Software Security: Importance, Techniques and Limitations_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assessment on Cyber Security
|15
|3818
|31

IS Security and Risk Management: Vulnerabilities, Mitigation Strategies and Impact of Human Factors
|14
|3394
|119

Malicious Software Protection Policy
|6
|1728
|181

Understanding Access Control in Cyber Security
|24
|9360
|80

Information Technology Security Issues
|3
|555
|185

Online Coursework on Computer and System Security
|6
|1112
|484