StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Software Security - Essay Example

Cite this document
Summary
This paper talks about Software Security. Software security refers to the protection of software from viruses using administrative and technical measures. With the advent of internet, software security has become a big concern. It proclaims “as Internet usage continues to rise throughout the world, the threat of cyber crime also grows”. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Software Security
Read Text Preview

Extract of sample "Software Security"

?Discussion Questions Answer No Software security refers to the protection of software from viruses using administrative and technical measures. With the advent of internet, software security has become a big concern. As Walker (n.d.) states, “as Internet usage continues to rise throughout the world, the threat of cyber crime also grows”. Hackers can harm the security of software by sending viruses and other harmful applications to computer systems of others through internet. Such viruses affect the working of software applications putting concerned people in trouble. However, use of antivirus applications, firewalls, and authentication system has made people able to secure their software and remove bugs effectively. Software testing refers to the ways people can use to test whether the software that they may have installed is fully secure or not considering the element of virus attacks. I personally believe that experience of dealing with software security issues does not always work in every situation because a number of new software security issues are coming up with the continuous advancement in the field of software technology. Therefore, users need to learn new ways to test the security of new software. One of the ways to check software security is to install the software in some other computer system and carry self-made virus and other malicious attacks on it. Using this way, one can know whether the software is able to work properly after the attacks or it has stopped working. Moreover, users can also expose the software to internet-based virus attacks that occur through emails. Using this approach, users can predict the protection level of the newly installed software. Another way to check the security of software is to risk-based approach. As Potter (n.d.) states, “testers must use a risk-based approach, grounded in both the system’s architectural reality and the attacker’s mindset, to gauge software security adequately”. This approach helps users identify security related risks in the software and create tests to measure the level of harm associated with those risks. Using this approach, users can identify those coding areas of the software where malicious attacks can be successful. These were some of the most useful ways to determine the level of security of any new software. Users can identify the level of software security and can take appropriate measure to manage associated risks. Answer No. 2 Selected Article: “Adoption of ISO 9000 quality assurance standards by South African agribusiness firms” by Christopher Turner, Gerald Ortmann, and Michael Lyne Discussion: The article focuses on the adoption of the ISO 9000 quality assurance standards for improving the performance of agribusiness firms. As Kietzman (2012) states, “quality assurance (QA) is a process-centered approach to ensuring that a company or organization is providing the best possible products or services”. If we study whole article, we also come to know that most of the respondent firms got administrative, economic, and production benefits due to adoption of ISO 9000 quality assurance standards. Quality assurance standards help agricultural firms get operational (waste reduction) benefits, as well as competitive advantage over other firms. According to Vinet (2010), quality assurance focuses on improving processes. It means that quality assurance does not deal with the results of the processes; rather it deals with enhancing the quality of manufacturing processes. In the article, the authors conducted a research on 92 agribusiness firms and came to know that nearly half of the firms were ISO 9000 cetified and many other firms were taking steps to improve the quality of their businesses using ISO 9000 quality assurance standards. Some of the benefits of adopting ISO 9000 quality assurance standards include improved customer satisfaction, reduced audits, as well as business expansion to other markets. About ISO 9000 quality assurance standards, the authors found that they are standards that are focused towards helping business firms know whether their businesses conform to the standards of quality or not. The authors also found that ISO 9000 quality assurance standards are the combination of systems made for the firms that are motivated towards bringing continuous improvement to their products, as well as towards improving operational efficiency. All of the firms explored by the authors of this article revealed that they have been using different quality assurance systems to reduce operational costs, as well as to improve the quality of products. The studies also showed that main adopters of such standards were large firms which manufactured agricultural products to export them to other countries. It means that large companies adopt ISO 9000 quality assurance standards because they know the potential benefits associated with following such standards. However, all other firms have also been using alternative quality assurance systems in order to reap somewhat similar benefits. Summing it up, we can say that quality assurance is one of the main functions of any manufacturing company whether it related to the business of agriculture or some other form of business. References Kietzman, S., 2012. What is Quality Assurance? Available at [Accessed 24 August 2012]. Potter, B., n.d. Software Security Testing. Available at [Accessed 24 August 2012]. Vinet, N., 2010. Quality Assurance Principles. Available at [Accessed 24 August 2012]. Walker, J., n.d. Different Types of Cyber Crimes. Available at [Accessed 24 August 2012]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Software Security Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1456196-software-security
(Software Security Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1456196-software-security.
“Software Security Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1456196-software-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Software Security

Software System in Different Cultural Environment

This research paper "Software System in Different Cultural Environment" presents the issue of perception of different customers from different cultural environments on safety, security, and performance in software.... hellip; Regarding the issue of importance that customers from different cultural environments attach to each of the listed requirements of the software system, the researcher can conclude that Europe and Asia attach much importance to the listed requirements as against America and Africa....
16 Pages (4000 words) Research Paper

Security Practitioners

Name: Institution: Course: Instructor: Date: Software developers and Software Security Software development is the process of developing software through a succession of steps that are arranged to enhance a smooth flow.... A major challenge through this form of learning is that the security part, which is very critical in any software, is usually left to the professional to handle it therefore denying software development learners a chance to have an intensive hands on experience in Software Security....
3 Pages (750 words) Essay

Role of Software Security in Maintaining Cyber Safety

The paper "Role of Software Security in Maintaining Cyber Safety" has reviewed and analyzed the role of Software Security in ensuring peace on the internet.... hellip; The role and value of Software Security have been appreciated a great deal because modern browsers are safeguarding the boundaries of the networks and computers by killing the evil in the bud.... Additionally, human error must be minimized by promoting proper shutdown whereas, the proper response to browser notifications can further assist the users in further improving security....
10 Pages (2500 words) Essay

Network security tools

It then supplies your computer with the necessary Software Security updates to keep it safe and scanning.... Kindly include why these tools are important, what do this help us achieve, whether there are different… The first and easiest application of an Intrusion Detection Systems for security purposes is known as application isolation.... Service monitoring Research and discuss the need for network security tools to assess network weaknesses and proactively fix these before they are exploited....
1 Pages (250 words) Essay

Source Code Analysis

Software Security is an important requirement for any business organization particularly the ones dealing with software development.... … By getting to understand and tabling the advantages of the technology as a component of a wholesome Software Security approach, IT experts can make a convincing case, which leads to an organizations wide acceptance and adoption.... Balancing Between Speed and security in App Development The demand for top-notch applications is increasing for business organizations in the world....
6 Pages (1500 words) Essay

Electronic Software Security in Medical Institutions

This essay discusses electronic Software Security in medical institutions.... It analyses government and technological sectors, for a better Software Security system.... Computer systems of various purposes are constantly plagued by threats of invasion, thus, the preventive defense is supposedly at hand with software system security.... The essay considers one of the most profound breaches in software attack is the breach of trust through online exploitation....
5 Pages (1250 words) Research Paper

Choosing a System Security Software for Business Organizations

Specifically, the essay will provide a critical assessment of the full-featured security suite known as Bitdefender Sphere security.... In any organization, system security is crucial and sensitive to executive management (McGraw, 2006).... Over the past years, many organizations have been failing due to a lack of appropriate and reliable security systems and software within their organizations.... Executive management should acquire updated, reliable, and efficient security software....
5 Pages (1250 words) Essay

Software Development Life Cycle, Dependencies and Critical Success Factors to the Job

The purpose of this report is to identify the major areas that may portend Software Security risks in the software development life cycle (SDLC), which is a collection of procedures and processes in the development and maintenance of software applications.... The increased Software Security will also increase the competitive advantage of Hot source by making Software Security its core marketing value propositionBackgroundOften, software attacks aim at sabotaging and causing software failure, subverting the software by changing the way the software operates such as by executing malicious logic embedded in the software, modifying or learning the operation of the software and the environment so as to be able to target the software more effectively....
9 Pages (2250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us