Analysis of Information Security Technologies: Software Security

Verified

Added on  2022/09/01

|7
|1652
|31
Essay
AI Summary
This essay analyzes information security technologies, specifically focusing on securing popular Microsoft applications such as Word, Excel, Skype, and OneDrive. It begins by emphasizing the importance of securing the operating system as a prerequisite for software security. The essay then delves into specific security measures for each application. For Microsoft Word and Excel, it explores password protection, read-only options, encryption, and restrict editing features. Regarding Skype, the analysis covers strong passwords, two-factor authentication, and linking Skype with a Microsoft account. Finally, for OneDrive, the essay highlights the importance of strong passwords, reviewing share permissions, and utilizing the personal vault feature. The essay concludes by emphasizing the significance of these techniques in protecting sensitive data and ensuring application security.
Document Page
Running head: ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
Name of student
Name of university
Author’s note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
Abstract
Once operating system is secured, it is then important to apply security strategies to each
software that is installed on that operating system. In this context, some popular applications
from Microsoft are considered and it is analysed in details how to secure these applications.
Applications that will be analysed are Microsoft word, Microsoft excel, Skype and One drive.
Document Page
2ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
Introduction
In order to ensure software security, it is required to ensure that security of operating system.
It is important to identify that in order to provide functionalities of a software, it access
resources from operating system. Therefore, if security of operating system is compromised,
then it affects security of software as well. For this, in order to ensure security of software, it
is first important to ensure security of operating system.
Analysis of Microsoft word and its security issues
Microsoft word is a popular word processing software that helps in writing and editing
documents. Along with personal applications, it is considered for enterprise applications for
creating documents ("Protect a document with a password", 2020). Therefore, these
documents often contain important information that needs to be secured from outside access
for ensuring data security and data privacy as well.
While document is created, it is recommended to select read only option. When this read only
option is selected then it asks to open this document in read only mode. Although it is
possible to open this document in editable format by denying this request as set by the author
of the document. Therefore, even though, it is not an effective strategy, its purpose is to
ensure when someone opens a document it is not editable in its first place for avoiding any
changes in original document which are not preferred.
Another important strategy is to encrypt document with password and this is an effective
strategy for securing Microsoft word application. In order to apply this, it is important to
open this document in edit mode and then select file menu option and then chose protect
document. It will provide option for password protection and this needs to be selected.
Along with this, it is also required to select a password as selecting password protection
would ask for password. After a password is provided, then anyone who need to edit those
Document Page
3ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
document would require to provide that password and therefore, it enhances security of
document as well ("Protect a document with a password", 2020).
Another option to enhance security of MS word document is to apply restrict editing feature
provided in this software. When this option is chosen, then it only allows people to read those
document and editing document is not allowed. It also requires password to edit this
document. In order to select this option, same process is to be followed as provided for
applying password protection for word document ("Protect a document with a password",
2020). It is also an effective strategy for enhancing security and privacy of word document as
well.
Analysis of Microsoft excel and its security issues
Microsoft excel is a preferred tool for creating spreadsheet to store data. It is also considered
for data analysis for applications which requires access to data collection and data analysis as
well.
Therefore, it is also important for ensuring security of this application as well. In this context
some important strategies are analysed for ensuring security and privacy of data that is stored
in various excel files. First of all, when a excel file is created, then it is required to choose file
option and then from there info menu needs to be chosen. Once this is chosen, from there
password protection option needs to be chosen. Then it ask for password and it needs to be
provided as well ("Protect an Excel file", 2020). Once password is provided, then anyone
who need to access this document for editing then it needs to provide that password that is
given by author of this excel file as well.
Another option for securing excel file is to choose review option and then chose protect sheet
option. Once this option is chosen, then it is required to provide a password and once a
password is provided then it again ask for password. After password is conformed then it is
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
not possible to edit this document, therefore ensuring security of this software as well
("Protect an Excel file", 2020).
Another important security feature of this software is encryption and it helps in securing
excel document. When encryption is applied then it is easier to ensure that accessing and
editing this document is not allowed which is important for securing this document and
therefore, it needs to be considered as well.
Analysis of Skype and its security issues
Skype is a popular application for video chat and voice calls. It is a popular application for
enterprise meeting for communicating with employees remotely. Although this is not an
application designed by Microsoft, but it was later purchased by Microsoft and branded as
their popular enterprise application. In order to secure this application some strategies are
considered in this context.
In order to secure this application, it is required to provide a strong password that is not easy
to interpret. If password that is associated with a Skype account is easy to identify then it is
easier for hackers to get access to those account and then obtain personal information as well.
Therefore, for securing this application, it is important to ensure that password chosen for
account is strong enough so that it is not easy to interpret by hackers. It will enhance security
of this application ("Privacy and security | Skype Support", 2020).
Along with this, another important strategy is to consider two phase authentication where to
gain access to account requires to provide code that is sent to a registered mobile number or
email that is associated with that account. Therefore, even if someone has password of an
account then also it is not easier to login to that account as verification code needs to be
provided that is sent to registered mobile number or email. This security strategy is more
effective than password for enhancing security and privacy of this application as well.
Document Page
5ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
Another effective security strategy in this context is to link Microsoft account with Skype
account. After Microsoft account is linked with Skype account, an alias is created for Skype
account. It allows to login to the account with Skype username and then it is possible to
disable this through Skype alliance. It ensures that security for this software is effective and
efficient as well ("Privacy and security | Skype Support", 2020).
Analysis of OneDrive and its security issues
OneDrive is a popular cloud storage service offered by Microsoft for storing documents
created with Microsoft office applications for example Microsoft word, Microsoft excel and
other popular Microsoft applications. However, it is important to note that this service is
provided for web version of Microsoft office applications (Almorsy, Grundy & Müller,
2016). As this application stores many important document including personal information, it
is important to secure this application and for this some strategies are analysed in this context.
One of the most important aspect for securing any online application is to provide a strong
password while creating account. When a strong password is selected, then it is not easy to
access those accounts and data stored in those accounts as well (Singh & Singh, 2017).
Therefore, this is important strategy for mitigating security issues for example login to
account without authorization, access data stored in those account. For this choosing a strong
and secure password is essential for security of this application as well.
While sharing files through OneDrive, it is required to review share permission and it allows
to restrict anyone other than owner to share files. Therefore, it helps in enhancing security of
this application.
In OneDrive, an important security feature is personal vault and when files are stored in
personal vault these files are encrypted. Therefore, it enhances security of this application as
well.
Document Page
6ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
References:
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Singh, S. K., & Singh, D. K. (2017). Cloud computing: Security issues and
challenges. International Journal of Advances in Engineering & Technology, 10(3),
338.
Protect a document with a password. (2020). Retrieved 29 March 2020, from
https://support.office.com/en-us/article/protect-a-document-with-a-password-
05084cc3-300d-4c1a-8416-38d3e37d6826
Protect an Excel file. (2020). Retrieved 29 March 2020, from https://support.office.com/en-
us/article/protect-an-excel-file-7359d4ae-7213-4ac2-b058-f75e9311b599
Privacy and security | Skype Support. (2020). Retrieved 29 March 2020, from
https://support.skype.com/en/skype/all/privacy-security/
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]