0% found this document useful (0 votes)
37 views

Alishba

The document discusses software security. It defines software, security, and software security. Software security aims to protect software from vulnerabilities and malicious attacks. It explains why software security is important as software is increasingly relied upon. It outlines common software security threats like phishing, ransomware attacks, and spoofing. The document then discusses techniques to improve software security such as keeping software updated, documenting security policies, and providing employee training.

Uploaded by

Muhammad Asfand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

Alishba

The document discusses software security. It defines software, security, and software security. Software security aims to protect software from vulnerabilities and malicious attacks. It explains why software security is important as software is increasingly relied upon. It outlines common software security threats like phishing, ransomware attacks, and spoofing. The document then discusses techniques to improve software security such as keeping software updated, documenting security policies, and providing employee training.

Uploaded by

Muhammad Asfand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

TITLE:

SOFTWARE SECURITY

PRESENTED BY: Presented to:


ALISHBA KHAN sir zaka-ur-rehman
TABLE OF CONTENT:

 What is software?
 What is security?
 What is software security?
 Why it is important?
 Software Security threats
 Software security techniques
WHAT IS SOFTWARE ?

Software is a set of instructions, data or programs used to operate computers and execute specific
tasks
 Operating systems (Microsoft Windows, Linux, macOS)
  Internet Browsers (including Firefox, Chrome, and Safari)
WHAT IS SECURITY ?

 Security means safety, as well as the measures taken to be safe or protected. 


 The state of being free from danger or threat.
SOFTWARE SECURITY
 Software security is the idea of engineering software so that it continues to function correctly
under malicious attack.
 Software security is the application of techniques that protect software systems from
vulnerabilities. These techniques ensure that software continues to function and are safe from
attacks. 
COMPONENT OF SECURITY

The CIA triad is a security model that consists of three vital


information security principles: confidentiality, integrity and
availability. 
 CONFIDENTIALITY: Confidentiality measures are
designed to prevent sensitive information from unauthorized
access attempts
 INTEGRITY: This component of the CIA triad ensures the
data is correct, authentic and reliable.
 AVAILABILITY: This principle ensures systems,
applications and data are available and accessible to
authorized users when they need them.
WHY SOFTWARE SECURITY IS IMPORTANT ?

 As we become more reliant on software, it becomes more important that software systems
are safe and secure. Hackers are increasingly targeting software as a way to manipulate
security vulnerabilities and gain access to sensitive data, especially against mobile apps.
 In addition, companies are required by law to protect certain types of data, such as credit
card information and social security numbers.
SOFTWARE SECURITY THREATS

A security threat is a malicious act that aims to corrupt or steal data .
Types of threats:
 Phishing
 Ransomware attacks
 Spoofing Attack
RANSOMWARE ATTACK

 Ransomware is a kind of malicious software that encrypts an individual’s files. So when this
happens, victims cannot access their files until they get decrypted. The malware asks the victim to
send money, usually in a cryptocurrency, so they can get a decryption code. Thus, the term
“ransom”.
PHISHING

 Phishing is when attackers send malicious emails designed to trick people into falling for a scam.
Typically, the intent is to get users to reveal financial information, system credentials or other sensitive
data.
SPOOFING

 This is the situation where a person (or program) successfully represents another
person (or program) in some software activity. This is done using false data to gain
an advantage that is illegal.
SECURITY TECHNIQUES

 Keep software up-to-date:

Every piece of software has issues at times. There’s no way to avoid that. But, this is one of the most
common ways that hackers take action on software users. This is why regular patching and staying up-to-
date on software is an important step in ensuring software security.

 Document your security policies:

Maintain a knowledge repository that includes comprehensively documented software security policies.


Security policies allow your employees, including network administrators, security staff, and so on, to
understand what activities you’re performing and why.
SECURITY TECHNIQUES CONT.

 Employee training:
Employees need to be aware of the risks associated with using software and how to protect themselves
and their company’s data.
y o u !
h a n k
T

You might also like