answersLogoWhite

0

Software Security

Software security includes all techniques involved in securing your programs against malicious users. Questions about everything from input validation to avoiding buffer overflows belong here.

500 Questions

Why is it important to keep information safe and secure?

User Avatar

Asked by Wiki User

the somplest way to keep PC secure is to use a good antivirus and firewall software. and on the other hand keep a copy of your important data. best PC security must based on your right way in your using. this is a good antivirus resource for you. it is

AVG Anti-Virus Network Edition

http://www.globalshareware.com/Utilities/Security-Encryption/

hope to help you!

Is software engineer a real engineering disciplinehow can a software engineer justify that he is an engineer?

User Avatar

Asked by Wiki User

I'd say it is and many software engineers would agree with me. However, the field is still in its early stage and needs to mature more. I think in the near future, software engineering will become a full fledged engineering discipline.

What are some security measures for a home computer?

User Avatar

Asked by Wiki User

1) Install anti-virus software on the computer and keep it up-to-date with virus definition files and any applicable patches

2) Install anti-spyware software on the computer and keep it up-to-date with spyware definition files and any applicable patches

3) Use an OS based firewall

4) Keep the OS patched with the latest patches from the vendor (usually Microsoft, Apple, or whatever flavor of LINUX you favor)

5) Keep all browser software patches up-to-date

6) Keep all applications patched to their latest patch levels - especially applications that interact with browsers or that make connections to the Internet

7) Operate in limited privilege mode except when you must operate at elevated (administrator) privileges to perform actions.

8) Use usernames and passwords to log onto the computer

9) Disable the "guest" accounts if you have an OS that has them.

10) Turn off the computer when not in use (hackers can't attack it when it's not on-line)

11) Turn off popups if your browser has the capability

12) If you use a wireless connection, turn on the security on the router.

13) Change the default passwords on any peripherals (like the wireless router)

14) Use passwords with some complexity - at least 12 characters long, with a mixture of upper and lower case letters, numerals, and special characters.

15) Don't open emails from unknown sources

These are some, but not all, of the easiest security measures for home computers.

The weakest link in computer security?

User Avatar

Asked by Wiki User

register

-------------

more so the user and my oppinion below that would be the kernel. if you can edit the kernel you can do pretty much anything you want and its also less protected than the register.

Freeware software for data recovery software?

User Avatar

Asked by Wiki User

The name itself can explain data recovery service. This refers to services that will provide you solutions, not just advice, on how to process a data recovery. So whether it is a deleted message, photo or any file, may it be on your mobile or hard drive, it is possible to retrieve it! The primary purpose of this kind of service is to help you in getting back what you have lost.

How do you install software from other computers?

User Avatar

Asked by Wiki User

it is very dificult to do that so i would sugest finding out the programs and softwares that you want and go download or by them yourself. or you have to go through a long and hard process of sending through the computer cables and that takes forever. so the other way is easier. :D

What is the best security for sale for computers?

User Avatar

Asked by Wiki User

Having a computer security system is very important to protect one's computer from unauthorized access, change or destruction. The best security system is to change one's passwords on a regular basis.

What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure?

User Avatar

Asked by Wiki User

The only sure way of protecting a network is unplugging its outside connection. There is no one definitive answer as far as safeguarding a network is concerned. Cybervandals / Hackers are coming up with more ways of violating our networks, so a mixture of softwares (antiviruses, spywares, firewalls, etc) and a hardware firewall (running on either UNIX or LINUX) along with constant vigilance and a dose of common sense would be good for starters.

What is Pre Written software And customized Software?

User Avatar

Asked by Wiki User

Pre-Written Software:

There are two type of prewritten software

1:- Application Software

a:- General Purpose Software

b:- Special Purpose Software

2:- System Software.

a:- System Support Software.

b:- System Development Software.

c:- System Control software.

(Note:- You can take the definition from Wikipedia..)

Custom Made Software.

Custom software is software that is specially developed for some specific organization or other user. As such it can be contrasted with the use of software packages developed for the mass market, such as commercial off-the-shelf (COTS) software, or existing free software.

Custom software can be developed by an in-house software development group, or be commissioned from a software house or independent software developer.

Large companies commonly use custom software for critical functions, including content management, inventory management, customer management, human resource management, or otherwise to fill needs that existing software packages cannot. Often such software is legacy software, developed before COTS software packages offering the required functionality became available.

Are computer cables a software?

User Avatar

Asked by Wiki User

Hardware is anything you can touch.

Software is programing.

How do computer risks infiltrate your computer?

User Avatar

Asked by Wiki User

Computer risks infiltrate your computer via downloaded content. This variates from simple cookies (temporary files saved into you computer by a specific site.) To movies,games etc. For example: If you download a file from an untrusted source, it might be infected with mal- or spyware. Be sure to always scan untrusted downloads, and be sure to have a good anti-virus software, in case you do get infected.

How can you evade a Wikipedia block?

User Avatar

Asked by Wiki User

You can contact WikiAnswers at e-mail Unblock @ Answers.com (remove spaces).

The reason for bans are violations of the Terms of Service. If you didn't read them, and inadvertently violated some of them, you could be reinstated. If a Supervisor provided guidance and it was ignored, or worse, and then you insulted the Supervisor, chances are pretty slim!

And posting bad language, spam, cyberbullying and vandalism aren't likely to be given a second chance.

What are advantage of access control list?

User Avatar

Asked by Wiki User

An access control lists specifies the various users and what level of access they have. If you activate an access control list in a application, the various components of the application will be accessed based on the level of access permitted to them and the access level specified in the access control list for the currently logged in user.

What is Difference between software system architecture and building architecture?

User Avatar

Asked by Wiki User

Difference Between Software Architecture and Software Design

Software Architecture focuses more on the interaction between the externally visible components of the system where as the Design is about how the internal components of the system interact with each other.

Software Architecture is more about what we want the system to do and and Design is about how we want to achieve that.

Software architecture is at a higher level of abstraction than the Software Design.

Software Architecture is concerned with issues beyond the data structures and algorithms used in the system.

What is computer security risk?

User Avatar

Asked by Wiki User

This is a very general statement because many things are in fact, computer security risks. The foremost risk would probably come from malicious code like Viruses, Spyware, and Trojan horses. These can be infected on a system or number of systems through exploits in operating system software or web browsing software. Also a common trend is a technique known as "phishing" where a spammer will send an email that looks like its from someone else and by clicking on a link/opening an attachment you may be downloading malware.

Some forms of malware can "phone home" back to the attacker which is how bot-nets are created which can be used to take down entire websites or be used as a launchpad to send lots of spam.

The biggest computer security risk is actually the user behind the computer in most cases. That is why it is important to practice safe internet habits and keep virus protection up to date.

For more information visit www.microsoft.com and search security.

A risk is a vulnerability that could allow loss of confidentiality, integrity, or availability of computer services and where there is a possibility of the vulnerability being exploited. All the items the first poster listed fit this description, but there are also other areas. Broadly, the sources of risks can be natural (like power surges, floods, fires, hurricanes, etc.) or man-made. The man-made can be both intentional (hackers, thieves, spammers etc.) and unintentional (coding mistakes, mistyping, loss of data storage media).

What is software maintainance?

User Avatar

Asked by Wiki User

Software maintenance is an important component of software development. Maintenance involves debugging the software, and releasing periodic updates to correct problems and make the software work better.

What can be done to improve the security of business by using internet?

User Avatar

Asked by Wiki User

Most of the security problems encountered on the Internet are due to human mistakes.

The first level of security "leaks" usually occurs during the developpement of the website. If a website developper doesn't correctly plan or proof test his scripts, an eventual hacker could extract confidential information from the website itself. This is usually done by exploiting particular errors or by inserting some particular code snippets into an input field or website URL.

The usual way to fix this problem is to make better planning when coding your website and to further test your scripts, especially those dealing with private datas.

Another kind of security problem are problems due to users neglecting their own private informations. A good example of this kind of neglection is when someone gives away his or her email address on a public forum. Some "crawler bots" (small programs coded to collect email addresses) could find the address and add it to a mass-mail list, sending spam to the user. This may not be a dangerous "security" problem but the same can also happen with user names and passwords. Most of the big hacking cases occure simply because an important user of a particular network gave away his private information.

The main way to fix this problem is to be very careful to who and how you display confidential datas. The best thing being simply not to display them.

Another big security problem is the download of virus-infected files. Most of the virus will usually not affect your computer, still, some of them might contain damageable programs for your computer or even allow a distant user to take control of your computer. These programs are called a "Trojan Horse". While some people may believe the opposite, it is impossible for someone to download potentially damaging files to your computer without your content, as long as you don't let your computer filter your downloads. At the same time, it is barely impossible to simply "get a virus" by surfing on the Internet. Virus mostly come with downloaded files that you usually consented to download or in attached email files that you opened without previously checking it.

That being said, the trick here is again to be extremely careful when you download a file. Peer-to-peer networks are also good virus hives and it is preferable to stay away from them.

The last and probably most uncommon internet security problem is hacking itself. True hacking usually means that the hacker had no or few information on his target and does most of the breakthrough with his own knowledge. Common users are usually not the target of hackers, hackers will usually try to get through security barrier of big organisation's Internet servers or try to hack Website Servers. They usually get to do so by using some software engineering flaws that have yet to be fixed (most of Windows Xp auto patching aims to fix these flaws for example).

At large, there is no particular way to help in this case, unless you're the developper of that software. Simply report the case to the developper and wait for a security fix or a new version with better security.

Hopefully, some companies actively work at the elimination of all these problems. For example, Norton provides users with a whole array of security tools (e.g: Norton AntiVirus) that do make a difference when it comes to clean up (virus-wise) your computer. Microsoft is also developping a software called "Microsoft AntiSpyware" that aims to help the users keep their privacy, eliminating history datas and Spywares.

What you need to keep in mind is that most of the security problems on the Internet are due to the users misunderstanding of the media or human mistakes. You need to be extremely careful when transfering files or displaying private information and pay close attention to new kinds of virus or security leaks. It's best to also keep in mind that the Internet is not the only network, local or wireless networks are as much vulnerable than is the Net.

How did Apache HTTP Server get on your computer?

User Avatar

Asked by Wiki User

Apache would have to have been installed by a user at some point, or a program that was installed required the service.

What is an alternative name for Application software?

User Avatar

Asked by Wiki User

what are some of the software that is being used in the work force today

What is the purpose of Encryption Software?

User Avatar

Asked by Wiki User

File encryption is a data security featue that offers reliable and advanced protection against security threats. Any data that can be used to identify an individual, group, company, or entity should be protected against unauthorized access during creation, transmission, operations, and storage. And that can achieved through file encryption only.

What is another good internet security to use besides norton internet security?

User Avatar

Asked by Wiki User

Matousec's Proactive Security Challenge hails a Comodo Internet Security Product as No. 1

AVG Internet Security 8.0 it works well and it doesn't slow down your computer.

McAffee also produces a well regarded internet security product. Kaspersky Labs does too. There are some pretty decent freeware and shareware products that perform almost as well as (or in some people's opinion - better than) the commercial products. Most of the non-commercial products provide less customer support however.

What is an explanation of software as a service?

User Avatar

Asked by Wiki User

one of three:

SaaS - Software-as-a-Service is a model of software deployment whereby a provider licenses an application to customers for use as a service on demand.

IaaS - Infrastructure-as-a-Service is the delivery of computer infrastructure (typically a platform virtualization environment) as a service.

PaaS - Platform-as a-Service is the delivery of a computing platform and solution stack as a service. It facilitates the deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers.

What are the Example of Application-Specific Software?

User Avatar

Asked by Wiki User

Specialised software is often written for specific companies or types of industries or organisations, that need it and it is not the kind of software you can just buy in a shop. If you want to do word processing, then it is very easy to go to a shop and buy a word processor. If you have your own company and want software to run some of your companies specialities, there would be no software that could do that in a shop, so you would get someone to write it for you. That would be specialised software. Software for companies like shops or financial institutions or for a doctor's surgery or for or managing online sales etc. would all be specialised. You would sell millions of copies of a word processor, but software that is specially written would only be used by very few people, so that is why it is not sold in shops and has to be specially designed. Ordinary computer users would have no interest in it, unlike a word processor, which almost anyone can use.

Application of maths in software engineering?

User Avatar

Asked by Wiki User

Math's and computer science influence each other. The goal of mathematics is to solve the problems in computer science and in other fields.