The Importance of Software Security

Only available on StudyMode
  • Download(s) : 213
  • Published : March 15, 2012
Open Document
Text Preview
The Importance of Software Security

When firms develop more technologically oriented, they must become more conscious of security and control issues close to their information systems and safeguard the resources more strictly than ever before. As our civilization and the domain it comes to be contingent on computers and information systems more and more, firms must put out a better determination in making their systems not vulnerable and more reliable. Software is a relatively new industry, less than fifty years old, and it has spent much of that time trying to figure out how to create reliable software applications with minimum errors. While much wonderful work has been done in a relatively short time, software remains the weakest link in our advanced technological society. Imagine what would happen if you were to link to the Internet that didn’t have a firewall or antivirus software. What do you think would be the outcome? To answer that question your computer would become disabled in a matter of seconds, and can take as long as a few days to recover (Laudon & Laudon, 2010). Daily security evaluation is done within your network. However, most of the users are not aware who monitors the security of their network. Therefore, most of these users are hoping that the one involved in measuring the effectiveness of your network's defenses is someone whom they trust. Conversely, tremendous evidence reports that you are not the only party questioning your network's perimeter (Safari, 2007). Most of IP addresses received thousands of attack attempts every day since it can be easily reached from the Internet. Many of these are trouble-free scans that we know how to defend against unexpectedly transfer us into occurrence investigation and cleanup mode. It is important to know if your organization has admission to expertise in all aspects of perimeter security, including networking, firewalls, intrusion detection systems (IDSs),...
tracking img