preview

Security Measures For A System

Better Essays

Review Paper On Security Measures For A System Ankita Dongre1, Trupti Kamthankar2, Suvarna Baviskar2, Akash Sharma2

1 Asst. Professor, 2Student
1 G. S. Mandal’s, Marathwada Institute Of Technology, 2 G. S. Mandal’s, Marathwada Institute Of Technology
Beed Bypaas Road, Aurangabad, Pin no.431028
1ankita.dongre@gmail.com, 2tgkamthankar@gmail.com, 2suvarna22kar30@gmail.com, 2akash.sharma305@gmail.com

Abstract: Security systems are constantly being a thread to ethical hackers; still in today 's scenario it is very crucial task to manage the security for various system components. This paper gives a deep insight towards every aspect of system consider system software, system hardware & system database. Apart from the core security techniques …show more content…

Five essential services provided by a secure system are Authentication, Authorization, Integrity, Privacy and Non-repudiation. So we can use security measures like use a strong password, Protect confidential information, Make sure our operating system and virus protection are up-to-date, Use secure and supported applications, Beware of suspicious e-mails, store confidential information only on HSU servers, backup our data and make sure we can restore it, protect information in all its forms, learn to be security aware [1]. The security is provided to any kind of system by using three measures as Software Security, Hardware Security and Database Security which conceptually shown as follows: Figure 1: System Security Framework

2. SOFTWARE SECURITY

Software security is an idea implemented to protect software against malicious attack and other hacker risks so that the software continues to function correctly under such potential risks. Security is necessary to provide integrity, authentication and availability [2].
Basically there are two types of software’s: System Software and Application Software. The security is provided by both kinds. The primary software security is provided by the operating system. So we performed analysis on various categories of operating systems for security issues and techniques.
2.1 Distributed System
The security

Get Access