Software Vulnerabililties
.docx
keyboard_arrow_up
School
American University *
*We aren’t endorsed by this school
Course
449
Subject
Computer Science
Date
Apr 3, 2024
Type
docx
Pages
5
Uploaded by SargentRabbit2376
Name: Oluwaseun O. Obikoya
Class: Secure Software Development (CSC 449-001, CSC 649-001)
Lecturer: Dr. Charles Pak
Software Vulnerabilities
What are Software Vulnerabilities? First of all, I would like to define what they mean separately. First and foremost, Software can be defined by the Merriam-Webster dictionary as “something used or associated with and usually contrasted with hardware: such as programs for a
computer.” While the definition of vulnerable is defined by the Merriam-Webster dictionary as “capable of being physically or emotionally wounded.” Therefore, Software Vulnerability is known is a weakness which can be exploited by someone known as a threat actor, such as an attacker, to cross privilege boundaries (i.e., perform unauthorized actions) within a computer system. For vulnerability to be exploited an attacker must have one applicable tool that can connect to a systems weakness. Attack surface are also known as software vulnerability.
“In its broadest sense, the term ‘vulnerability’ is associated with some violation of a security policy. This may be due to weak security rules, or it may be that there is a problem within the software itself. In theory, all computer systems have vulnerabilities; whether or not they are serious depends on whether or not they are used to cause damage to the system.” (kaspersky encyclopedia) This shows that software vulnerability is easily done or accessed when computer systems have weak security.
Software is known to be instructions that give computers instructions on what to do. Software’s are known to constitute with an integrated set of procedures, programs and most especially routines associated with the daily operation of a computer. This term was coined to discern these instructions from hardware i.e., which are the physical components of a computer system. Instructions that direct a computer’s hardware which gives it specific task to perform is known as program which is also known as software program.
There are two main software’s we look at and they are called application software and system software. In the aspect of system software this controls the internal function of a computer through the operating system and can also control such items as the monitor, storage devices and printers. On the other hand, Application software includes applications like word processors, spreadsheets, database management, inventory and payroll programs, as well some many other applications. Network software is the third software category that organizes communication between a linked network and computers.
It’s known that typically software is stored on an externally long-term memory (storage) device such as magnetic diskette and a hard drive. When a program is said to be in use, the computer reads it from the storage device and temporarily places the instructions in what is known as the random-access memory (RAM). The process of storing and then performing the instructions is called “running,” or “executing,” a program. By contrast, software programs and procedures that are permanently stored in a computer’s memory using a read-only (ROM) technology are called firmware, or “hard software.”
Risk Factor Models
Resources whether physical or logical tend to have one or more vulnerabilities which can be exploited by what we call threat actors. The result from this as we well know can possibly ruin the availability, integrity or confidentiality of resources which may belong to an organization and/or parties that may be involved.
For an attack to be active is when there is an attempt to alter their resources for their systems that may affect their operation which has the tendency to comprise the availability or integrity of the system. On the other hand, a passive attack can be considered to help learn or also make use of the information from the systems, but it is noted that this does not affect the system resources neither does it affect the compromising confidentiality.
OWASP is a diagram that depicts a similar phenomenon but in different terms: in addition, a threat agent through an attack can be able to exploit weaknesses of any system with the related security controls that causes it to have a technical fault on any IT resource (asset) that maybe connected to the impact of the business.
OWASP: relationship between threat agent and business impact
Information Security Management System:
ISMS (information Security Management System) are a set of policies that have been developed to help manage, according to the principles that have to do with risk management, there has been a countermeasure to ensure that a security strategy can be setup to follow the rules
and regulations that are known to be applicable to any given organization. The countermeasures that are put in place are known as Security controls but when they are applied to a transmission that holds information which is called security services. Classification:
Vulnerabilities can be classified according to the assets class that they are known to be related to:
1.
Hardware
o
susceptibility to humidity or dust
susceptibility to unprotected storage
age-based wear that causes failure
over-heating
2.
Software:
Insufficient testing
Insecure Coding
Lack of audit trail
Design flaw
3.
Network:
Insecure network architecture
Unprotected communication lines (e.g., lack of cryptography)
4.
Personnel:
Insider treat
Inadequate security awareness
Inadequate recruiting process
5.
Physical Site:
Interruption to power source
Area subject to natural disasters (e.g., flood, earthquake) 6.
Organizational:
Lack of regular audits
Lack of security
Lack of continuity plans
Causes:
Complexity: Large, this are complex systems that increase the probability of flaws.
Familiarity: The use of common, well-known code, operating systems, software, and/or hardware increases the probability an attacker has or can find the knowledge and tools to exploit the flaw.
Password management flaws: Users tend to re-use passwords between many programs and websites.
Connectivity: More physical connections, privileges, ports, protocols, and services and time each
of those are accessible increase vulnerability
Fundamental operating systems design flaws: This operating system flaw allows viruses and malware to execute commands on behalf of the administrator.
Internet Website Browsing: After visiting those websites, the computer systems become infected and personal information will be collected and passed on to third party individuals.
Unchecked user input: The program assumes that all user input is safe.
Software bugs: The software bug may allow an attacker to misuse an application.
Vulnerability consequence:
It is known that the impacts on security breaches can be very high. IT managers or the upper management team for a fact have been known to be aware that applications and IT systems
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
(e) Based on the type of hacker you select, explain whether a hacker should be legally prosecuted in they break into a device and review or perhaps revise or destroy the data in the device.
(f) If you feel the hacker is doing something of benefit, explain your thoughts.
(g) Every person in the class must present their own unique situation regarding ergonomics so there should be no duplicates from anyone in the class when they present their Discussion entry.
arrow_forward
In the context of computer science, what does the phrase "grey code" refer to?
arrow_forward
computer science - What does "interdependence" mean in terms of system concepts, and how does it differ from other terms used to express the same thing?
arrow_forward
Prepare and submit a comprehensive report that includes all necessary citations. Here are the six tiers of our computer science hierarchical structure: the study of computational theory and the design of computer hardware The last rung on the ladder is occupied by the computer itself. Among the offerings are: a fifth of a scale In the fourth grade, students learn about global issues. Is there a problem with social computing as a whole at this level?
arrow_forward
When it comes to operating systems, what kind of effects does "Race Condition" have on them?
arrow_forward
Computer-related waste and errors can be eliminated only via the implementation of rules and practices.
arrow_forward
Identify In the course of the development of computer science, there have been a number of catastrophic software failures that may be traced back to their root causes.
arrow_forward
Explain the principles of object-oriented programming (OOP) and provide examples of how OOP concepts like inheritance and polymorphism are applied in software development.
arrow_forward
Why is insufficient division of responsibilities a concern in the computer environment?
arrow_forward
With the advent of various technological advancements, law enforcement efforts in the investigation and prosecution of crime have been met with positive results. However, with every advantage comes a disadvantage. Criminals have also benefited from these technologies and use the same advancements that law enforcement employs during the commission of their crimes, or as a tool for their crimes (this is evidenced in computer-related offenses and the misuse of the internet). In a 3 – 4 page paper (excluding title and reference pages), address the following areas in full detail: summarize the advantages of computers/software and the use of computer technology in investigations, summarize the disadvantages to law enforcement with respect to the advancements of computers, research a case where the computer was used to aid in the commission of a crime, research a case where the use of the computer was beneficial to the prosecution in a criminal case, and provide a final…
arrow_forward
A professional software developer develops any professional software. If someone is take his code and use for his own purposes without proper tagging the original developer. Then what kinds of violation will occur. How the copyright of the intellectual property of that software developer will be ensured?
arrow_forward
What does object-oriented programming (OOP) accomplish? Object-oriented programming (OOP) can be demonstrated with an illustration.
arrow_forward
What precisely is meant by the term "grey code" in the field of computer science?
arrow_forward
What distinguishes software copyright from license?
arrow_forward
In the computer science field, the terms "cohesion" and "coupling" are used interchangeably.
arrow_forward
To what extent is it possible to prohibit unethical and illegal behaviour in computer science?
arrow_forward
5
arrow_forward
Define object serialization and explain its primary use cases in software development.
arrow_forward
As it did with many technologies, World War II greatly influenced the development of computers In what ways did the war effort contribute to the evolution of computer technology? In what ways did the need for secrecy during the war hinder computer development?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- (e) Based on the type of hacker you select, explain whether a hacker should be legally prosecuted in they break into a device and review or perhaps revise or destroy the data in the device. (f) If you feel the hacker is doing something of benefit, explain your thoughts. (g) Every person in the class must present their own unique situation regarding ergonomics so there should be no duplicates from anyone in the class when they present their Discussion entry.arrow_forwardIn the context of computer science, what does the phrase "grey code" refer to?arrow_forwardcomputer science - What does "interdependence" mean in terms of system concepts, and how does it differ from other terms used to express the same thing?arrow_forward
- Prepare and submit a comprehensive report that includes all necessary citations. Here are the six tiers of our computer science hierarchical structure: the study of computational theory and the design of computer hardware The last rung on the ladder is occupied by the computer itself. Among the offerings are: a fifth of a scale In the fourth grade, students learn about global issues. Is there a problem with social computing as a whole at this level?arrow_forwardWhen it comes to operating systems, what kind of effects does "Race Condition" have on them?arrow_forwardComputer-related waste and errors can be eliminated only via the implementation of rules and practices.arrow_forward
- Identify In the course of the development of computer science, there have been a number of catastrophic software failures that may be traced back to their root causes.arrow_forwardExplain the principles of object-oriented programming (OOP) and provide examples of how OOP concepts like inheritance and polymorphism are applied in software development.arrow_forwardWhy is insufficient division of responsibilities a concern in the computer environment?arrow_forward
- With the advent of various technological advancements, law enforcement efforts in the investigation and prosecution of crime have been met with positive results. However, with every advantage comes a disadvantage. Criminals have also benefited from these technologies and use the same advancements that law enforcement employs during the commission of their crimes, or as a tool for their crimes (this is evidenced in computer-related offenses and the misuse of the internet). In a 3 – 4 page paper (excluding title and reference pages), address the following areas in full detail: summarize the advantages of computers/software and the use of computer technology in investigations, summarize the disadvantages to law enforcement with respect to the advancements of computers, research a case where the computer was used to aid in the commission of a crime, research a case where the use of the computer was beneficial to the prosecution in a criminal case, and provide a final…arrow_forwardA professional software developer develops any professional software. If someone is take his code and use for his own purposes without proper tagging the original developer. Then what kinds of violation will occur. How the copyright of the intellectual property of that software developer will be ensured?arrow_forwardWhat does object-oriented programming (OOP) accomplish? Object-oriented programming (OOP) can be demonstrated with an illustration.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning