About Some Methods for Software Security

  • Shafagat Jabrail Mahmudova Institute of Information Technology Of ANAS
Keywords: Software, security, analysis methods, risks.

Abstract

This study reviews software security, etc. It studies the methods for the analysis of software security. The problems of software protection are identified. The risks for software projects, their management, determination and categories are studied. Software development process includes the construction of an agreed structure for software development. The design of large distributed systems uses many programming languages, which in turn causes certain difficulties. That is, security in these cases is not provided. Software security is a set of measures aimed at its protection.  Security in software exploitation is also a key issue. Software security is understood as its functioning without any problems. Information security threats arise in the process of software exploitation.

Author Biography

Shafagat Jabrail Mahmudova, Institute of Information Technology Of ANAS
Ph.d. Department pattern recognition

References

(1). For the protection of information it is proposed to use face recognition technology, Information security journal, 10.29.2008, retrieved from

http://www.itsec.ru/newstext.php?news_id=51127#sthash.HQGrMBJh.dpuf.

(2). Bakhtizin, V.V. and Glukhova, L.A. (2010), Software Development Technology, Minsk: BSUIR.

(3). Gromov, Yu.Yu., Ivanova,O.G., Belyaev, M.P. and Minin,Yu.V. (2013) Programming Technology. FSBEI:TSTU.

(4). Kadan, A.M. Methodology and programming technology, retrieved from

http://mf.grsu.by/Kafedry/kaf001/academic_process/048/28

(5). Efimov, A.I. and Palchun, B.P. (1995) On the Technological Security of the Computer Informational Sphere, Information Security Issues, vol., 3, pp. 86-88.

(6). Kazarin, V. (2003) Security of computer systems software, Moscow: MSUL.

(7). Software security analysis methods, retrieved from

https://studbooks.net/2043842/informatika/metody_analiza_bezopasnosti_programmnogo_obespecheniya

(8). Sereda, S. A. Software and hardware systems for software protection. ER, retrieved from

http://www.ase.md/~osa/publ/ru/pubru427.html.

(9). Signature, retrieved from

https://ru.wikipedia.org/wiki/ Signature

(10). Yashchenko, V. V. (2003) Introduction to cryptography, M.: MTSNMO: CheRo.

(11). Lexeme, retrieved from

https://ru.wikipedia.org/wiki/ LEXEM

(12). Jeesoo, K. T. and Hwankuk, K. (2018) Antomatic Vulnerability Detection and Remediation Method for Software Security, International journal of wireless information networks, vol. 10, pp. 117-129.

(13). Mihailescu, M. S. and Nita, M. P. (2016) Software security techniques: Mircea cel Batran, Naval Academy Scientific Bulletin, vol., 19, 8 p.

(14). Georg, V. (2018) Winning with Open Process Innovation. MIT, Sloan management review, vol., 59, pp. 53-56.

(15). Timoti, L. The main risks of a software development project, retrieved from

https://econ.wikireading.ru/78462

Published
2019-05-01