About Some Methods for Software Security
DOI:
https://doi.org/10.14738/tnc.72.6334Keywords:
Software, security, analysis methods, risks.Abstract
This study reviews software security, etc. It studies the methods for the analysis of software security. The problems of software protection are identified. The risks for software projects, their management, determination and categories are studied. Software development process includes the construction of an agreed structure for software development. The design of large distributed systems uses many programming languages, which in turn causes certain difficulties. That is, security in these cases is not provided. Software security is a set of measures aimed at its protection. Security in software exploitation is also a key issue. Software security is understood as its functioning without any problems. Information security threats arise in the process of software exploitation.
References
(1). For the protection of information it is proposed to use face recognition technology, Information security journal, 10.29.2008, retrieved from
http://www.itsec.ru/newstext.php?news_id=51127#sthash.HQGrMBJh.dpuf.
(2). Bakhtizin, V.V. and Glukhova, L.A. (2010), Software Development Technology, Minsk: BSUIR.
(3). Gromov, Yu.Yu., Ivanova,O.G., Belyaev, M.P. and Minin,Yu.V. (2013) Programming Technology. FSBEI:TSTU.
(4). Kadan, A.M. Methodology and programming technology, retrieved from
http://mf.grsu.by/Kafedry/kaf001/academic_process/048/28
(5). Efimov, A.I. and Palchun, B.P. (1995) On the Technological Security of the Computer Informational Sphere, Information Security Issues, vol., 3, pp. 86-88.
(6). Kazarin, V. (2003) Security of computer systems software, Moscow: MSUL.
(7). Software security analysis methods, retrieved from
https://studbooks.net/2043842/informatika/metody_analiza_bezopasnosti_programmnogo_obespecheniya
(8). Sereda, S. A. Software and hardware systems for software protection. ER, retrieved from
http://www.ase.md/~osa/publ/ru/pubru427.html.
(9). Signature, retrieved from
https://ru.wikipedia.org/wiki/ Signature
(10). Yashchenko, V. V. (2003) Introduction to cryptography, M.: MTSNMO: CheRo.
(11). Lexeme, retrieved from
https://ru.wikipedia.org/wiki/ LEXEM
(12). Jeesoo, K. T. and Hwankuk, K. (2018) Antomatic Vulnerability Detection and Remediation Method for Software Security, International journal of wireless information networks, vol. 10, pp. 117-129.
(13). Mihailescu, M. S. and Nita, M. P. (2016) Software security techniques: Mircea cel Batran, Naval Academy Scientific Bulletin, vol., 19, 8 p.
(14). Georg, V. (2018) Winning with Open Process Innovation. MIT, Sloan management review, vol., 59, pp. 53-56.
(15). Timoti, L. The main risks of a software development project, retrieved from