大象传媒

Network security and cybersecurity - EdexcelProtecting systems when writing software

Networks operate on the principles of communication and sharing. That means network traffic and data could be accessed by people who have no authority to do so. Enhanced security measures can help to prevent cyberattacks.

Part of Computer SciencePrinciples of computer science

Protecting systems when writing software

It is important to think about security at the design stage of a package as this may stop some cyberattacks being possible.

Before writing software, there are a number of questions that need to be considered:

  • What threats is the software likely to face?
  • Does the software need security features like usernames and passwords, or will security be provided by the in some other way?
  • How will be installed?
  • Should the software use ?
  • Does the system need to create an ?

An audit trail is a record of what has been done, and who or what did it. For example, in a banking system, the audit trail would show the date, time and location of a transaction and how the transaction was performed - eg by cash machine or member of staff. An audit trail can be used to check what happened and return the system to a previous state if needed.

While software is being written, there are a number of processes that can be used which will help ensure the software is as secure as possible. are checks of by other experienced programmers to check it is well written and that no security issues have been created. is testing individual sections of code to ensure that they work as expected and don鈥檛 contain security issues before they are added to the rest of the system. is input to the module, it is processed and outputs are produced. This testing could be done manually or by using an automated test system.

Consideration should also be given to the that the software will be run on. Some operating systems are more secure than others. A secure operating system will be designed with security in mind and is likely to contain features to help the ensure the system security is maintained.