Computer security software: Difference between revisions

Content deleted Content added
GreenC bot (talk | contribs)
Move 1 url. Wayback Medic 2.5
Citation bot (talk | contribs)
Alter: pages. Add: authors 1-1. Removed parameters. Formatted dashes. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Abductive | #UCB_webform 315/3850
Line 9:
 
==Types==
Below, various software implementations of Cybersecurity patterns and groups outlining ways a host system attempts to secure itself and its assets from malicious interactions, this includes tools to deter both [[Passive attack|passive]] and active [[threat (computer)|security threats]]. Although both security and usability are desired, today it is widely considered in computer security software that with higher security comes decreased usability, and with higher usability comes decreased security.<ref>{{Cite book|last=Barragán|first=Claudio Casado|title=Information Technology - New Generations|publisher=Springer International Publishing|year=2017|isbn=9783319549774|pages=395-398395–398}}</ref>
 
===Prevent access===
Line 16:
* [[Steganography]] and [[Steganography tools]]
 
A critical tool used in developing software that prevents malicious access is ''Threat Modeling''.<ref>{{Cite journal|lastlast1=Bodeau|firstfirst1=Deborah J.|last2=McCollum|first2=Catherine D.|last3=Fox|first3=David B.|date=2018-04-07|title=Cyber Threat Modeling: Survey, Assessment, and Representative Framework|url=https://apps.dtic.mil/sti/citations/AD1108051|archive-url=https://web.archive.org/web/20210929040958/https://apps.dtic.mil/sti/citations/AD1108051|url-status=live|archive-date=September 29, 2021|language=en}}</ref> Threat modeling is the process of creating and applying mock situations where an attacker could be trying to maliciously access data in [[cyberspace]]. By doing this, various profiles of potential attackers are created, including their intentions, and a catalog of potential vulnerabilities are created for the respective organization to fix before a real threat arises.<ref>{{Cite web|title=Threat Modeling: 12 Available Methods|url=https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/|access-date=2021-10-04|website=SEI Blog|language=en}}</ref> Threat modeling covers a wide aspect of cyberspace, including devices, applications, systems, networks, or enterprises. Cyber threat modeling can inform organizations with their efforts pertaining to cybersecurity in the following ways:<ref>{{Cite book|last=Jones|first=Andy|url=https://www.worldcat.org/oclc/159937634|title=Risk management for computer security : Protecting your network and information assets|date=2005|publisher=Elsevier Butterworth-Heinemann|others=Debi Ashenden|isbn=978-0-08-049155-4|___location=Amsterdam, Netherlands|oclc=159937634}}</ref>
 
* Risk Management