Essay in Software security

User Generated

fnsvyvar

Computer Science

Description

In an essay, review the following statements:

  • Once your operating system is secure, you can focus on securing the software that runs in the operating system.
  • Evaluate some of the most popular Microsoft applications and analyze how to make an application more secure to protect your organization’s data. Describe at least three (3) techniques used to secure an application.

Provide information from your readings to support your statements.

Deliverables:

Well-written essay should be 4-5 pages in length, incorporating at least two academic resources. Cite all sources using APA style guidelines, citing references as appropriate.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

i have made some adjustments on the above paper,therefore uploading the final work

Running head: SOFTWARE SECURITY

1

Software security
Name
Course details
Instructor
Institution
Date

SOFTWARE SECURITY

2

Over the last few years, cyber security has been a big has been a significant threat to
organizations. People have become so smart that they remotely access your system without leaving
back any trace. Therefore, calling for software security. Software security is an idea put into place
to ensure that computer software that is operating system and applications are protected from
hackers and malicious attack making the software not to function effectively. Despite significant
progress in recent times, software insecurity remains a substantial problem. To determine how to
curb it. This paper will explore and examine various ways and techniques to make operating system
software and application software safe and secure.
An Operating system is a type of software that gives support to computer's essential
functions such as task scheduling and controlling peripheral devices. In present times, the operating
system is more complicated and have advanced features than ever before, this is helpful to the
organization and at the same time bring with it security nightmares. Consequently, a secure
operating system environment enables an application to run smoothly, and any weakness in it could
comprise the integrity of the application. Therefore, it is necessary for it to be monitored,
adequately administered and configured effectively making it very stable, controlling access, and
appropriately secured before focusing on software that runs in the operating system
(Ramachandran,2016). Have you ever imagined a computer without advanced and user-friendly
operating system? Well, I know you cannot appreciate this may be because you didn't have a taste
of how hectic using command prompts were in early years of operating system evolution. Securing
OS should not be done manually, it should be centralized and automated correctly.
An organization that embraces proper techniques for securing an operating system saves a
lot from thefts of information to unauthorized logins; it keeps on costs for hiring maintenance staff
here and then. There exist various best practices for protecting the operating system. First, an
enterprise should employ an administrator who permits user account...


Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags