Question

In: Computer Science

The security for application software is enhanced and optimized through a procedure called threat modeling. In...

The security for application software is enhanced and optimized through a procedure called threat modeling. In major applications, such as those used by manufacturing, banking, or distribution companies, that do scheduling, resource management, inventory management, accounting, and more, security is a crucial element of its operations. Research threat modeling and briefly describe a procedure you would recommend to provide robust security for a major application in this type of environment

Solutions

Expert Solution

The security application must need to the security. Because the application software consist of financial software, Accounting software so this type of application software need more security. in this type of application software all the transactions made in this application software's ad we already know that the transaction of any type medium its more important. that's why we need to stay secure about it.

If we take the example of banking system. In bank system lot more people make the transactions with bank. Bank already established the one security network. through this security network all the transaction of banking system remains secured. And this security network is highly secured no any other simple people can hack them. We know if the banks details get hacked then big problems will occurs. Then after that we need to recover our data from hackers and build more security tools form us to next time it cannot be hacked.

some application software provides the extra security for self security. And it is important to build self made tool for security purpose. Security is essential entity of today's technological life. Also there is a some tools to detect the error in the data. It optimise th error conditions in the application software systems.

Thus the security tools will work.


Related Solutions

discuss role of security models in implementing security policy in a software application
discuss role of security models in implementing security policy in a software application
Outline the major security issues related to mobile application technologies and Develop a policy and procedure...
Outline the major security issues related to mobile application technologies and Develop a policy and procedure for one of the major security issues you outlined
Application Security & Backup/Recovery Looking at the Cherwell software. 3.5.1. In respect to recovery, is there...
Application Security & Backup/Recovery Looking at the Cherwell software. 3.5.1. In respect to recovery, is there is a time objective for restoring the system after a disruption? 3.5.2. Is there a service level objective when restoring the system? 3.5.3. Is there a certain amount of data (like 3 hours or days of transactions) that can be considered an acceptable (tolerable) interim loss from a disruption to the system?
An application has been through pureview and regression testing and it's prepared for release. A security...
An application has been through pureview and regression testing and it's prepared for release. A security engineer is asked to analyze an application binary to look for potential vulnerabilities prior to wide release. After thoroughly analyzing an application to engineer informs the developer they should include additional input sanitation in the application to prevent overflow. Which of the following tools did the security engineer most likely used to determine this recommendation? Fuzzing HTTP interceptor vulnerability scanner SCAP scanner
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT