Computer security software

Computer security software or cybersecurity software is any computer program designed to influence information security. This is often taken in the context of defending computer systems or data, yet can incorporate programs designed specifically for subverting computer systems due to their significant overlap, and the adage that the best defense is a good offense.

The defense of computers against intrusion and unauthorized use of resources is called computer security. Similarly, the defense of computer networks is called network security.

The subversion of computers or their unauthorized use is referred to using the terms cyberwarfare, cybercrime, or security hacking (later shortened to hacking for further references in this article due to issues with hacker, hacker culture and differences in white/grey/black 'hat' color identification).

The computer security software products industry was launched in the second half of the 1970s when computer firms and new IT startups chose alternative paths to offer commercial access control systems to organizational mainframe computer users. These developments were led by IBM's Resource Access Control Facility and SKK's Access Control Facility 2.[1]

Types

Below, various software implementations of Cybersecurity patterns and groups outlining ways a host system attempts to secure itself and its assets from malicious interactions, this includes tools to deter both passive and active security threats. Although both security and usability are desired, today it is widely considered in computer security software that with higher security comes decreased usability, and with higher usability comes decreased security.[2]

Prevent access

The primary purpose of these types of systems is to restrict and often to completely prevent access to computers or data except to a very limited set of users. The theory is often that if a key, credential, or token is unavailable then access should be impossible. This often involves taking valuable information and then either reducing it to apparent noise or hiding it within another source of information in such a way that it is unrecoverable.

A critical tool used in developing software that prevents malicious access is Threat Modeling.[3] Threat modeling is the process of creating and applying mock situations where an attacker could be trying to maliciously access data in cyberspace. By doing this, various profiles of potential attackers are created, including their intentions, and a catalog of potential vulnerabilities are created for the respective organization to fix before a real threat arises.[4] Threat modeling covers a wide aspect of cyberspace, including devices, applications, systems, networks, or enterprises. Cyber threat modeling can inform organizations with their efforts pertaining to cybersecurity in the following ways:[5]

  • Risk Management
  • Profiling of current cybersecurity applications
  • Considerations for future security implementations

Regulate access

The purpose of these types of systems is usually to restrict access to computers or data while still allowing interaction. Often this involves monitoring or checking credential, separating systems from access and view based on importance, and quarantining or isolating perceived dangers. A physical comparison is often made to a shield. A form of protection whose use is heavily dependent on the system owners preferences and perceived threats. Large numbers of users may be allowed relatively low-level access with limited security checks, yet significant opposition will then be applied toward users attempting to move toward critical areas.

Monitor access

The purpose of these types of software systems is to monitor access to computers systems and data while reporting or logging the behavior. Often this is composed of large quantities of low priority data records / logs, coupled with high priority notices for unusual or suspicious behavior.

Surveillance monitor

These programs use algorithms either stolen from, or provided by, the police and military internet observation organizations to provide the equivalent of a police Radio scanner. Most of these systems are born out of mass surveillance concepts for internet traffic, cell phone communication, and physical systems like CCTV. In a global perspective they are related to the fields of SIGINT and ELINT and approach GEOINT in the global information monitoring perspective. Several instant messaging programs such as ICQ (founded by "former" members of Unit 8200), or WeChat and QQ (rumored 3PLA/4PLA connections[6][7]) may represent extensions of these observation apparati.

Block or remove malware

The purpose of these types of software is to remove malicious or harmful forms of software that may compromise the security of a computer system. These types of software are often closely linked with software for computer regulation and monitoring. A physical comparison to a doctor, scrubbing, or cleaning ideas is often made, usually with an "anti-" style naming scheme related to a particular threat type. Threats and unusual behavior are identified by a system such as a firewall or an intrusion detection system, and then the following types of software are used to remove them. These types of software often require extensive research into their potential foes to achieve complete success, similar to the way that complete eradication of bacteria or viral threats does in the physical world. Occasionally this also represents defeating an attackers encryption, such as in the case of data tracing, or hardened threat removal.

See also

References

  1. ^ Yost, Jeffrey R. (2015). "The Origin and Early History of the Computer Security Software Products Industry". IEEE Annals of the History of Computing. 37 (2): 46–58. doi:10.1109/MAHC.2015.21. Retrieved 2023-12-13.
  2. ^ Barragán, Claudio Casado (2017). Information Technology - New Generations. Springer International Publishing. pp. 395–398. ISBN 9783319549774.
  3. ^ Bodeau, Deborah J.; McCollum, Catherine D.; Fox, David B. (2018-04-07). "Cyber Threat Modeling: Survey, Assessment, and Representative Framework". Archived from the original on September 29, 2021. {{cite journal}}: Cite journal requires |journal= (help)
  4. ^ "Threat Modeling: 12 Available Methods". SEI Blog. 2 December 2018. Retrieved 2021-10-04.
  5. ^ Jones, Andy (2005). Risk management for computer security : Protecting your network and information assets. Debi Ashenden. Amsterdam, Netherlands: Elsevier Butterworth-Heinemann. ISBN 978-0-08-049155-4. OCLC 159937634.
  6. ^ O'Neill, Patrick Howell (3 May 2017). "Under tough surveillance, China's cybercriminals find creative ways to chat". SNG. cyberscoop. Retrieved 22 October 2020.
  7. ^ Dasgupta, Binayak (1 July 2020). "Mass surveillance risk real with Chinese apps: Experts". Hindustan Times, New Delhi. Retrieved 22 October 2020.

Read other articles:

Penyelam mutiara di Jepang Perburuan mutiara adalah tindakan mengambil mutiara dari moluska liar, biasanya oyster atau mussel, di laut atau air tawar. Perburuan mutiara lazim dilakukan di kawasan Teluk Persia dan Jepang, selain juga dilakukan di kawasan lainnya. Daftar pustaka Al-Hijji, Yacoub Yusuf (2006). Kuwait and the Sea. A Brief Social and Economic History. Arabian Publishing. ISBN 978-0-9558894-4-8.  al-Shamlan, Saif Marzooq (2001). Pearling in the Arabian Gulf. A Kuwaiti Mem...

 

 

العلاقات الكاميرونية السويسرية الكاميرون سويسرا   الكاميرون   سويسرا تعديل مصدري - تعديل   العلاقات الكاميرونية السويسرية هي العلاقات الثنائية التي تجمع بين الكاميرون وسويسرا.[1][2][3][4][5] مقارنة بين البلدين هذه مقارنة عامة ومرجعية للدولتي�...

 

 

Football clubViitorul Minerul LupeniFull nameClubul Sportiv Viitorul Minerul LupeniNickname(s)Minerii (The Miners)Roș-negrii (The Red-Blacks])Founded1920; 104 years ago (1920) as Jiul Lupeni 2021; 3 years ago (2021) as Viitorul Minerul LupeniGroundMinerulCapacity5,000OwnerLupeni MunicipalityChairmanEmil LumperdeanManagerDan VoicuLeagueLiga IV2022–23Liga IV, Hunedoara, 2nd of 11 Home colours Away colours Clubul Sportiv Viitorul Minerul Lupeni, commonly kn...

Эту страницу предлагается переименовать в «Биркат ха-левана».Пояснение причин и обсуждение — на странице Википедия:К переименованию/14 сентября 2021. Пожалуйста, основывайте свои аргументы на правилах именования статей. Не удаляйте шаблон до подведения итога обсуждени...

 

 

Kansas's gun laws Location of Kansas in the United States Gun laws in Kansas regulate the sale, possession, and use of firearms and ammunition in the state of Kansas in the United States.[1] Summary table Subject / law Long guns Handguns Relevant statutes Notes State permit required to purchase? No No Firearm registration? No No Assault weapon law? No No Magazine capacity restriction? No No Owner license required? No No Permit required for concealed carry? N/A No K.S.A. § 21-630...

 

 

Physical law for entropy and heat ThermodynamicsThe classical Carnot heat engine Branches Classical Statistical Chemical Quantum thermodynamics Equilibrium / Non-equilibrium Laws Zeroth First Second Third Systems Closed system Open system Isolated system State Equation of state Ideal gas Real gas State of matter Phase (matter) Equilibrium Control volume Instruments Processes Isobaric Isochoric Isothermal Adiabatic Isentropic Isenthalpic Quasistatic Polytropic Free expansion Reversibi...

Pour les articles homonymes, voir Wonder. Si ce bandeau n'est plus pertinent, retirez-le. Cliquez ici pour en savoir plus. Cet article ne cite pas suffisamment ses sources (janvier 2021). Si vous disposez d'ouvrages ou d'articles de référence ou si vous connaissez des sites web de qualité traitant du thème abordé ici, merci de compléter l'article en donnant les références utiles à sa vérifiabilité et en les liant à la section « Notes et références ». En pratique...

 

 

EstiaHestia Giustiniani, II secolo d.C., copia di un originale in bronzo del V secolo a.C. Roma, Collezione Torlonia. Nome orig.Ἑστία Caratteristiche immaginarieSpeciedea Sessofemmina Estia (pronuncia: Estìa[1]; in greco antico: Ἑστία?, Hestíā) è una divinità della religione greca, figlia di Crono e Rea[2]. Dea vergine della casa e del focolare, era una divinità importante e oggetto di culto, tanto da essere considerata tradizionalmente una dei dodici O...

 

 

Sébastien BourdaisBourdais in 2008Kebangsaan FrenchLahirSébastien Olivier Bourdais28 Februari 1979 (umur 45)Le Mans, FranceJulukanSea BassPencapaianJuara Champ Car World Series 2004, 2005, 2006, 2007Juara International Formula 3000 2002Juara Formula Tiga Prancis 1999PenghargaanRookie of the Year CART FedEx Championship Series 2003Karier Seri IndyCar74 lomba dalam kurun waktu 6 tahunTimNo. 18 (Dale Coyne Racing)Hasil terbaikPosisi 10 – (2014, 2015)Lomba pertamaIndianapolis 500 2005 (...

International athletics championship event1992 European Athletics Indoor ChampionshipsDates28 February–1 MarchHost cityGenoa ItalyVenuePalasport di GenovaEvents27Participation439 athletes from 35 nations← 1990 Glasgow 1994 Paris → The 1992 European Athletics Indoor Championships were held in 1992 in Genoa, Italy. This was the first edition to be held biannually and not annually and also the first to be held over three days as opposed to two. It also marked the debut of the combi...

 

 

County in Florida, United States Volusia redirects here. For the unincorporated community, see Volusia, Florida. For the moth, see Peoria (moth). County in FloridaVolusia CountyCountyVolusia County courthouse in DeLand, built in 2001 LogoLocation within the U.S. state of FloridaFlorida's location within the U.S.Coordinates: 29°3′N 81°9′W / 29.050°N 81.150°W / 29.050; -81.150Country United StatesState FloridaFoundedDecember 29, 1854Named forCommunity o...

 

 

Body of salt water off the coast of Kyūshū, Japan A NASA satellite image of the Ariake Sea in 2007 The Ariake Sea (有明海, Ariake-kai) is a body of salt water surrounded by Fukuoka, Saga, Nagasaki, and Kumamoto Prefectures, all of which lie on the island of Kyūshū in Japan. It is the largest bay in Kyūshū. Its deepest point is only about 50 meters (165 ft) deep, and extreme tides exceed 4 meters (13 ft), covering roughly 1,700 square kilometres (660 sq mi). Isahaya Bay...

The GiftAlbum studio karya Susan BoyleDirilis8 November 2010DirekamJuli–September 2010 London InggrisGenrePop, akustik, holiday[1]LabelSyco/ColumbiaProduserSteve MacKronologi Susan Boyle I Dreamed a Dream(2009)I Dreamed a Dream2009 The Gift(2010) The Gift adalah album kedua penyanyi asal Skotlandia, Susan Boyle. Album ini dirilis pada tanggal 8 November 2010.[2] Boyle has hinted that it will have a 1960s feel because that was my era.[3][4] Daftar lagu No....

 

 

Annual beauty pageant competition in Malaysia Miss Universe MalaysiaFormation1962; 62 years ago (1962)TypeBeauty pageantOrganizationHeadquartersKuala LumpurLocationMalaysiaMembership Miss UniverseOfficial language EnglishNational DirectorEleen YongFranchise HolderMyEG Services BerhadCurrent titleholder Serena LeeKey people Jakkaphong Jakrajutatip Raul Rocha Websitemumo.com.my Miss Universe Malaysia is an annual national beauty pageant and an organization that selects Malaysi...

 

 

Ne doit pas être confondu avec Gouberville. Gourbesville L'église Saint-Ermeland. Administration Pays France Région Normandie Département Manche Arrondissement Cherbourg Intercommunalité Communauté de communes de la Baie du Cotentin Statut commune déléguée Maire délégué Mandat Marylise Gervais 2020-2026 Code postal 50480 Code commune 50212 Démographie Population 166 hab. (2019) Densité 20 hab./km2 Géographie Coordonnées 49° 25′ 15″ nord, 1° ...

1902 book by John A. Hobson Imperialism: A Study AuthorJ.A. HobsonLanguageEnglishPublication date1902Publication placeUnited KingdomOCLC63269928 Part of a series aboutImperialism studies Theories Dependency theory Intercommunalism Neo-Gramscianism Neocolonialism Social imperialism Super-imperialism Three Worlds Theory Ultra-imperialism World-systems theory Concepts Ecologically unequal exchange North–South model Unequal exchange Superprofit Uneven and combined development People Samir Amin ...

 

 

1969 film by Frank Perry This article is about the film. For the song by Lostprophets, see Last Summer (song). For the album, see Last Summer (album). For other uses, see The Last Summer. Last SummerTheatrical PosterDirected byFrank PerryWritten byEleanor PerryBased onLast Summerby Evan HunterStarringBarbara HersheyRichard ThomasBruce DavisonCatherine BurnsCinematographyEnrique BravoGerald HirschfeldEdited bySidney KatzMarion KraftMusic byJohn SimonProductioncompanyAlsid ProductionsDistribute...

 

 

Halaman ini berisi artikel tentang partai politik di Republik Rakyat Tiongkok. Untuk partai politik di Republik Tiongkok setalah 1949, lihat Daftar partai politik Taiwan. Tiongkok Artikel ini adalah bagian dari seri Politik dan KetatanegaraanTiongkok Kepemimpinan Generasi kepemimpinan Kepemimpinan kolektif Pemimpin tertinggi Kepemimpinan inti Kepemimpinan sekarang Pemerintahan Xi-Li Pemimpin nasional Presiden (daftar): Xi Jinping Wakil Presiden (daftar): Li Yuanchao Pemimpin provinsi Partai K...

Combat helmet Enhanced Combat Helmet Later generation ECH high cutTypeCombat helmetPlace of originUnited StatesService historyIn service2012–presentUsed bySee UsersProduction historyDesigned2007ManufacturerCeradyne[1] and Gentex[2]ProducedMarch 2012 – presentSpecificationsMass3.3 lb/1.5kg An early ECH prototype; the production model uses a slightly different chinstrap. Video of the ECH U.S. Marine wearing an ECH in 2018 The Enhanced Combat Helmet (E...

 

 

Pour les articles homonymes, voir Costner. Kevin Costner Kevin Costner en 2016. Données clés Nom de naissance Kevin Michael Costner Surnom Kev Naissance 18 janvier 1955 (69 ans)Lynwood, Californie (États-Unis) Nationalité Américaine Profession ActeurProducteurRéalisateurChanteur Films notables Les IncorruptiblesDanse avec les loupsRobin des Bois, prince des voleursJFKBodyguard Séries notables Yellowstone modifier Kevin Costner [ˈkɛvɪn ˈkɑstnɚ][1] est un acteur, prod...