Professional Documents
Culture Documents
Software Sequrity Presentation
Software Sequrity Presentation
SECURITY
PRESENTED BY
MAHFUZ HASAN
182-15-11584
Computer security
• Integrity :
Integrity refers to the trustworthiness of data or resources, and it is
usually phrased in terms of preventing improper or unauthorized
change
• Availability :
Availability refers to the ability to use the information or resource
desired. Availability is an important aspect of reliability as well as of
system design because an unavailable system is at least as bad as no
system at all.
•
relationship of computer security concepts
Jobayadul Islam Niloy
182-15-11464
threats in information security
Threats can be classified into four different categories; direct, indirect, veiled,
conditional. A direct threat identifies a specific target and is delivered in a
straightforward, clear, and explicit manner.
• Ransomware. ...
• Cloud computing vulnerabilities.
kinds of security threats
• The Four Primary Types of Network Threats
• Unstructured threats.
• Structured threats.
• Internal threats.
• External threats.
Emrul Hasan SiFat
182-15-11669
software security vulnerabilities
A software vulnerability is a glitch, flaw, or weakness present in
the software or in an OS (Operating System). The severity
of software vulnerabilities advances at an exponential rate. Of
course, all systems include vulnerabilities.
TYPES OF
* Human-social
* Physical
* Economic
* Environmental and their associated direct and
indirect losses
Most Common Software Vulnerabilities
1. Injection. Injection occurs when an attacker exploits insecure code
to insert (or inject) their own code into a program. ...
8. Insecure Deserialization.