Software Security

User Generated

njox99

Computer Science

Description

Assignment Details:

In an essay, review the following statements based on the readings from this week’s module:

  • Once your operating system is secure, you can focus on securing the software that runs in the operating system.
  • Evaluate some of the most popular Microsoft applications and analyze how to make one more secure to protect your organization’s data. Describe at least three (3) techniques used to secure an application.

Provide information from your readings to support your statements.

Deliverables:

Your well-written essay should be four to five pages in length, incorporating at least three academic resources from the Library in addition to the assigned readings. Cite and follow academic writing standards and APA style guidelines, citing references as appropriate.

More original thoughts and insights are needed. Introduction and conclosion is also required.

It is strongly encouraged that you submit all assignments to the TurnItIn Originality Check prior to submitting it to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the TurnItIn Originality Check – Student Guide for step-by-step instructions

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: SOFTWARE SECURITY

1

Software Security
Name
Institution

SOFTWARE SECURITY

2
Software Security
Introduction

Security in information technology is paramount as the operating system running a
computer cannot function or function efficiently if it is bugged. Security forms a crucial part of
the system in protecting its functionality, the data stored from corruption, and from external
attacks. There exist different forms of security in the market for which can be used to guard
against security breaches and infection by virus and system bugs. Importantly, it pays to
understand one’s system when deciding the best form of security as some form of security may
end up being a problem to the system instead of providing the safety first bargained for. More so,
each system has its capacity and requires specific kind of applications that do not slow them
down and hinder functionality. Nevertheless, security in information technology is essential as
virtual data is susceptible to many forms of insecurities, especially those that endanger the
privacy of the user, concerning data and their personal information. There exist some ways and
applications that can be used to secure an operating system and protect the data and applications
that run the whole system.
Securing the Software in an Operating System
Compatibility
The basis function in a computer is purely based on the stability and credibility of the
operating system that is brought about by the security settings in place. Nevertheless, it is
important to have applications that are compatible with the operating system. Otherwise, the OS
will be burdened by the weight of trying to run all the systems at once. In return, the OS will lack
the capacity and capability to protect itself or even the data and applications within it.

SOFTWARE SECURITY

3

Compatibility contributes significantly to the security of a system, and without it, the system is
doomed to fail and engender the whole system (Whittaker & Thompson, 2003).
Accessibility
Many of the applications operating in the OS come with specifications that allow the
parent company some accessibility. Even with a secure and compatible operating system, the
application will allow the passing or relaying of data outside the computer security system. Also,
the parent company of the Applications will have access to the system without the knowledge of
the user. To tackle the problem, it is crucial that when installing an application one takes time to
read the “terms of agreement” to identify those accessibility options that such an applications
come with. Terms of the agreement allow one to turn off some of those options as a security
measure. Some applications do not have options for “turn off” and purely depends on the
owner’s ability to identify the security loopholes and choose not to install such a system.
Network Access
Internet forms a crucial part of security in a computer system. Most attacks happen
through the internet even where there is enough security of the OS. It is vital that the network
system used to access the internet is secure and has the passwords that a...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags