About Some Methods for Software Security
This study reviews software security, etc. It studies the methods for the analysis of software security. The problems of software protection are identified. The risks for software projects, their management, determination and categories are studied. Software development process includes the construction of an agreed structure for software development. The design of large distributed systems uses many programming languages, which in turn causes certain difficulties. That is, security in these cases is not provided. Software security is a set of measures aimed at its protection. Security in software exploitation is also a key issue. Software security is understood as its functioning without any problems. Information security threats arise in the process of software exploitation.
(1). For the protection of information it is proposed to use face recognition technology, Information security journal, 10.29.2008, retrieved from
(2). Bakhtizin, V.V. and Glukhova, L.A. (2010), Software Development Technology, Minsk: BSUIR.
(3). Gromov, Yu.Yu., Ivanova,O.G., Belyaev, M.P. and Minin,Yu.V. (2013) Programming Technology. FSBEI:TSTU.
(4). Kadan, A.M. Methodology and programming technology, retrieved from
(5). Efimov, A.I. and Palchun, B.P. (1995) On the Technological Security of the Computer Informational Sphere, Information Security Issues, vol., 3, pp. 86-88.
(6). Kazarin, V. (2003) Security of computer systems software, Moscow: MSUL.
(7). Software security analysis methods, retrieved from
(8). Sereda, S. A. Software and hardware systems for software protection. ER, retrieved from
(9). Signature, retrieved from
(10). Yashchenko, V. V. (2003) Introduction to cryptography, M.: MTSNMO: CheRo.
(11). Lexeme, retrieved from
(12). Jeesoo, K. T. and Hwankuk, K. (2018) Antomatic Vulnerability Detection and Remediation Method for Software Security, International journal of wireless information networks, vol. 10, pp. 117-129.
(13). Mihailescu, M. S. and Nita, M. P. (2016) Software security techniques: Mircea cel Batran, Naval Academy Scientific Bulletin, vol., 19, 8 p.
(14). Georg, V. (2018) Winning with Open Process Innovation. MIT, Sloan management review, vol., 59, pp. 53-56.
(15). Timoti, L. The main risks of a software development project, retrieved from
Copyright (c) 2019 Transactions on Networks and Communications
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors wishing to include figures, tables, or text passages that have already been published elsewhere are required to obtain permission from the copyright owner(s) for both the print and online format and to include evidence that such permission has been granted when submitting their papers. Any material received without such evidence will be assumed to originate from the authors.
All authors of manuscripts accepted for publication in the journal Transactions on Networks and Communications are required to license the Scholar Publishing to publish the manuscript. Each author should sign one of the following forms, as appropriate:
License to publish; to be used by most authors. This grants the publisher a license of copyright. Download forms (MS Word formats) - (doc)
Publication agreement — Crown copyright; to be used by authors who are public servants in a Commonwealth country, such as Canada, U.K., Australia. Download forms (Adobe or MS Word formats) - (doc)
License to publish — U.S. official; to be used by authors who are officials of the U.S. government. Download forms (Adobe or MS Word formats) – (doc)
The preferred method to submit a completed, signed copyright form is to upload it within the task assigned to you in the Manuscript submission system, after the submission of your manuscript. Alternatively, you can submit it by email email@example.com