SlideShare a Scribd company logo
1 of 3
Running Head: HARDWARE AND SOFTWARE SECURITY 1
4
HARDWARE AND SOFTWARE SECURITY
Topic: Hardware and Software Security
Name
Institute
Hardware and Software Security
Hardware security refers to vulnerability protection which
comes in the form of a physical device rather than software
that's installed on the computer system hardware. It can also
pertain to a device that scans a system or monitors network
traffic thus it also protects physical systems from harm.
Software security refers to an idea that was implemented to
protect software against malicious attacks and other hacker
risks for the software to keep functioning correctly under such
possible risks, to ensure authentication availability and integrity
security is required.
There are various advantages of hardware security
including reduction of costs by automating routine tasks like
keeping records, payroll, and accounting, it also enhances
productivity among the staff and business efficiency by
developing effective communication within the organization and
with clients, moreover, it develops a competitive advantage by
executing or implementing the right business technology which
boosts the morale of the employees. (Kin Fun Li & Narges
Attarmoghaddam, 2018) however, hardware security also has its
drawbacks including it is difficult to upgrade and install
hardware security like in the case of hardware firewalls it is
also slightly expensive to install this hardware security in your
organization due to the high cost in some hardware security like
firewalls it takes up a lot of physical space and it involves
wiring. Additionally, we have counterfeiting challenges for
hardware designs are copied and imitated illegally thus we
should come up with measures to counteract this counterfeiting
program.
Software security entails various benefits including prevention
of viruses, identity theft, and spyware by using software to
secure the confidential information of an organization for
hackers are coming up with trickier ways to hack the system
thus carefully safeguarding the system by using software is
needed. Besides software also protects valuable information by
encrypting and limiting access to sensitive information of an
organ. It also ensures compliance by providing the required
encryption for compliance whenever the file is accessed, this is
among many other advantages of security software. (10
Common Software Security Weaknesses, 2019) however it also
has demerits including launching attacks and damaging the
system for attackers utilizes software security weaknesses to
launch attacks on the organization system, it also causes
financial losses whenever the software vulnerability causes
downtime leading to losses of billions of dollars by the
organization. Besides sensitive data can be exposed si nce some
software does not protect sensitive data like health information
among other critical data. We also have security
misconfiguration in software development due to incomplete
configuration or insecure default configurations.
Conclusion
To sum, hardware and software security are paramount in
today's world since there's a need for protective and defensive
tools this is because sensitive information is stored in the cloud,
and also financial transactions are done online. Organizations
should be on their toes since hackers are hitting hard on both
small and biggest organizations in the world thus organizations
must take preventive and proactive steps and invest in effective
hardware and software security to safeguard their data, systems,
and devices.
References
10 Common Software Security Weaknesses. (2019, June 27).
Kiuwan. https://www.kiuwan.com/blog/10-common-software-
security-weaknesses/
Damaj, I., & Kasbah, S. (2018). An analysis framework for
hardware and software implementations with applications from
cryptography. Computers & Electrical Engineering, 69, 572–
584. https://doi.org/10.1016/j.compeleceng.2017.06.008
Kin Fun Li, & Narges Attarmoghaddam. (2018, May).
Challenges and Methodologies of Hardware Security.
ResearchGate; unknown.
https://www.researchgate.net/publication/327009189_Challenge
s_and_Methodologies_of_Hardware_Security
The benefits of software systems. (2019). Www.cs.uct.ac.za.
https://www.cs.uct.ac.za/mit_notes/software/htmls/ch01s07.html

More Related Content

What's hot

Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Fasoo
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talkritupande
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEIJNSA Journal
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET Journal
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMatthew J McMahon
 
Five it functions in an organization
Five it functions in an organizationFive it functions in an organization
Five it functions in an organizationAbdullahi Jibriil
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
SharePoint Security Playbook [eBook]
SharePoint Security Playbook [eBook]SharePoint Security Playbook [eBook]
SharePoint Security Playbook [eBook]Imperva
 
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAMIT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAMIJCSEA Journal
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidentsbelsis
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec
 

What's hot (20)

Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
Lkm 2011
Lkm 2011Lkm 2011
Lkm 2011
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talk
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATEENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
ENHANCING INFRASTRUCTURE SECURITY IN REAL ESTATE
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Task 3
Task 3Task 3
Task 3
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy Paper
 
Five it functions in an organization
Five it functions in an organizationFive it functions in an organization
Five it functions in an organization
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
SharePoint Security Playbook [eBook]
SharePoint Security Playbook [eBook]SharePoint Security Playbook [eBook]
SharePoint Security Playbook [eBook]
 
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAMIT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
 

Similar to Running head hardware and software security14 hardware an

Running head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxRunning head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxsusanschei
 
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfImplementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfBahaa Abdul Hussein
 
Securing Your Work from Home.pdf
Securing Your Work from Home.pdfSecuring Your Work from Home.pdf
Securing Your Work from Home.pdfKavitaDubey18
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Information security[277]
Information security[277]Information security[277]
Information security[277]Timothy Warren
 
Information security software security presentation.pptx
Information security software security presentation.pptxInformation security software security presentation.pptx
Information security software security presentation.pptxsalutiontechnology
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
SafeguardsintheworkplaceAdam Richards
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test ProfessionalsTechWell
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test ProfessionalsTechWell
 
Importance Of Cyber Security In Software Development.pptx
Importance Of Cyber Security In Software Development.pptxImportance Of Cyber Security In Software Development.pptx
Importance Of Cyber Security In Software Development.pptxwowinfotech
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docxvickeryr87
 

Similar to Running head hardware and software security14 hardware an (20)

Running head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxRunning head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docx
 
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfImplementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
 
Securing Your Work from Home.pdf
Securing Your Work from Home.pdfSecuring Your Work from Home.pdf
Securing Your Work from Home.pdf
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Information security software security presentation.pptx
Information security software security presentation.pptxInformation security software security presentation.pptx
Information security software security presentation.pptx
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
Safeguardsintheworkplace
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
Importance Of Cyber Security In Software Development.pptx
Importance Of Cyber Security In Software Development.pptxImportance Of Cyber Security In Software Development.pptx
Importance Of Cyber Security In Software Development.pptx
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
 

More from AKHIL969626

One of the most common used risk management tools is the Incident Re.docx
One of the most common used risk management tools is the Incident Re.docxOne of the most common used risk management tools is the Incident Re.docx
One of the most common used risk management tools is the Incident Re.docxAKHIL969626
 
One of the first anthropologists to examine religion in Africa was E.docx
One of the first anthropologists to examine religion in Africa was E.docxOne of the first anthropologists to examine religion in Africa was E.docx
One of the first anthropologists to examine religion in Africa was E.docxAKHIL969626
 
One of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docxOne of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docxAKHIL969626
 
One function of a leader is to provide the vision for the organizati.docx
One function of a leader is to provide the vision for the organizati.docxOne function of a leader is to provide the vision for the organizati.docx
One function of a leader is to provide the vision for the organizati.docxAKHIL969626
 
One could argue that old-fashioned attitudes regarding gender and t.docx
One could argue that old-fashioned attitudes regarding gender and t.docxOne could argue that old-fashioned attitudes regarding gender and t.docx
One could argue that old-fashioned attitudes regarding gender and t.docxAKHIL969626
 
One of the hallmarks of qualitative research is writing detailed obs.docx
One of the hallmarks of qualitative research is writing detailed obs.docxOne of the hallmarks of qualitative research is writing detailed obs.docx
One of the hallmarks of qualitative research is writing detailed obs.docxAKHIL969626
 
One of the three main tenants of information security is availabilit.docx
One of the three main tenants of information security is availabilit.docxOne of the three main tenants of information security is availabilit.docx
One of the three main tenants of information security is availabilit.docxAKHIL969626
 
One of the challenges in group problem solving is identifying the ac.docx
One of the challenges in group problem solving is identifying the ac.docxOne of the challenges in group problem solving is identifying the ac.docx
One of the challenges in group problem solving is identifying the ac.docxAKHIL969626
 
One is the personal plot that unfolds around the relationships betwe.docx
One is the personal plot that unfolds around the relationships betwe.docxOne is the personal plot that unfolds around the relationships betwe.docx
One is the personal plot that unfolds around the relationships betwe.docxAKHIL969626
 
One and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docxOne and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docxAKHIL969626
 
One 750 - word essay exploring an art historical issue presented in .docx
One 750 - word essay exploring an art historical issue presented in .docxOne 750 - word essay exploring an art historical issue presented in .docx
One 750 - word essay exploring an art historical issue presented in .docxAKHIL969626
 
One of the most interesting items in the communication realm of orga.docx
One of the most interesting items in the communication realm of orga.docxOne of the most interesting items in the communication realm of orga.docx
One of the most interesting items in the communication realm of orga.docxAKHIL969626
 
One of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docxOne of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docxAKHIL969626
 
One of the ways businesses provide secure access to their networ.docx
One of the ways businesses provide secure access to their networ.docxOne of the ways businesses provide secure access to their networ.docx
One of the ways businesses provide secure access to their networ.docxAKHIL969626
 
On Stretching Time (250 Words)The given paradigms by which we.docx
On Stretching Time (250 Words)The given paradigms by which we.docxOn Stretching Time (250 Words)The given paradigms by which we.docx
On Stretching Time (250 Words)The given paradigms by which we.docxAKHIL969626
 
On the evening news, social media and even in conversation, do you f.docx
On the evening news, social media and even in conversation, do you f.docxOn the evening news, social media and even in conversation, do you f.docx
On the evening news, social media and even in conversation, do you f.docxAKHIL969626
 
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docxOn p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docxAKHIL969626
 
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docxOn 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docxAKHIL969626
 
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docxOn September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docxAKHIL969626
 
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docxOn January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docxAKHIL969626
 

More from AKHIL969626 (20)

One of the most common used risk management tools is the Incident Re.docx
One of the most common used risk management tools is the Incident Re.docxOne of the most common used risk management tools is the Incident Re.docx
One of the most common used risk management tools is the Incident Re.docx
 
One of the first anthropologists to examine religion in Africa was E.docx
One of the first anthropologists to examine religion in Africa was E.docxOne of the first anthropologists to examine religion in Africa was E.docx
One of the first anthropologists to examine religion in Africa was E.docx
 
One of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docxOne of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docx
 
One function of a leader is to provide the vision for the organizati.docx
One function of a leader is to provide the vision for the organizati.docxOne function of a leader is to provide the vision for the organizati.docx
One function of a leader is to provide the vision for the organizati.docx
 
One could argue that old-fashioned attitudes regarding gender and t.docx
One could argue that old-fashioned attitudes regarding gender and t.docxOne could argue that old-fashioned attitudes regarding gender and t.docx
One could argue that old-fashioned attitudes regarding gender and t.docx
 
One of the hallmarks of qualitative research is writing detailed obs.docx
One of the hallmarks of qualitative research is writing detailed obs.docxOne of the hallmarks of qualitative research is writing detailed obs.docx
One of the hallmarks of qualitative research is writing detailed obs.docx
 
One of the three main tenants of information security is availabilit.docx
One of the three main tenants of information security is availabilit.docxOne of the three main tenants of information security is availabilit.docx
One of the three main tenants of information security is availabilit.docx
 
One of the challenges in group problem solving is identifying the ac.docx
One of the challenges in group problem solving is identifying the ac.docxOne of the challenges in group problem solving is identifying the ac.docx
One of the challenges in group problem solving is identifying the ac.docx
 
One is the personal plot that unfolds around the relationships betwe.docx
One is the personal plot that unfolds around the relationships betwe.docxOne is the personal plot that unfolds around the relationships betwe.docx
One is the personal plot that unfolds around the relationships betwe.docx
 
One and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docxOne and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docx
 
One 750 - word essay exploring an art historical issue presented in .docx
One 750 - word essay exploring an art historical issue presented in .docxOne 750 - word essay exploring an art historical issue presented in .docx
One 750 - word essay exploring an art historical issue presented in .docx
 
One of the most interesting items in the communication realm of orga.docx
One of the most interesting items in the communication realm of orga.docxOne of the most interesting items in the communication realm of orga.docx
One of the most interesting items in the communication realm of orga.docx
 
One of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docxOne of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docx
 
One of the ways businesses provide secure access to their networ.docx
One of the ways businesses provide secure access to their networ.docxOne of the ways businesses provide secure access to their networ.docx
One of the ways businesses provide secure access to their networ.docx
 
On Stretching Time (250 Words)The given paradigms by which we.docx
On Stretching Time (250 Words)The given paradigms by which we.docxOn Stretching Time (250 Words)The given paradigms by which we.docx
On Stretching Time (250 Words)The given paradigms by which we.docx
 
On the evening news, social media and even in conversation, do you f.docx
On the evening news, social media and even in conversation, do you f.docxOn the evening news, social media and even in conversation, do you f.docx
On the evening news, social media and even in conversation, do you f.docx
 
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docxOn p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
 
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docxOn 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
 
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docxOn September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
 
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docxOn January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
 

Recently uploaded

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Running head hardware and software security14 hardware an

  • 1. Running Head: HARDWARE AND SOFTWARE SECURITY 1 4 HARDWARE AND SOFTWARE SECURITY Topic: Hardware and Software Security Name Institute Hardware and Software Security Hardware security refers to vulnerability protection which comes in the form of a physical device rather than software that's installed on the computer system hardware. It can also pertain to a device that scans a system or monitors network traffic thus it also protects physical systems from harm. Software security refers to an idea that was implemented to protect software against malicious attacks and other hacker risks for the software to keep functioning correctly under such possible risks, to ensure authentication availability and integrity security is required. There are various advantages of hardware security including reduction of costs by automating routine tasks like keeping records, payroll, and accounting, it also enhances productivity among the staff and business efficiency by
  • 2. developing effective communication within the organization and with clients, moreover, it develops a competitive advantage by executing or implementing the right business technology which boosts the morale of the employees. (Kin Fun Li & Narges Attarmoghaddam, 2018) however, hardware security also has its drawbacks including it is difficult to upgrade and install hardware security like in the case of hardware firewalls it is also slightly expensive to install this hardware security in your organization due to the high cost in some hardware security like firewalls it takes up a lot of physical space and it involves wiring. Additionally, we have counterfeiting challenges for hardware designs are copied and imitated illegally thus we should come up with measures to counteract this counterfeiting program. Software security entails various benefits including prevention of viruses, identity theft, and spyware by using software to secure the confidential information of an organization for hackers are coming up with trickier ways to hack the system thus carefully safeguarding the system by using software is needed. Besides software also protects valuable information by encrypting and limiting access to sensitive information of an organ. It also ensures compliance by providing the required encryption for compliance whenever the file is accessed, this is among many other advantages of security software. (10 Common Software Security Weaknesses, 2019) however it also has demerits including launching attacks and damaging the system for attackers utilizes software security weaknesses to launch attacks on the organization system, it also causes financial losses whenever the software vulnerability causes downtime leading to losses of billions of dollars by the organization. Besides sensitive data can be exposed si nce some software does not protect sensitive data like health information among other critical data. We also have security misconfiguration in software development due to incomplete configuration or insecure default configurations.
  • 3. Conclusion To sum, hardware and software security are paramount in today's world since there's a need for protective and defensive tools this is because sensitive information is stored in the cloud, and also financial transactions are done online. Organizations should be on their toes since hackers are hitting hard on both small and biggest organizations in the world thus organizations must take preventive and proactive steps and invest in effective hardware and software security to safeguard their data, systems, and devices. References 10 Common Software Security Weaknesses. (2019, June 27). Kiuwan. https://www.kiuwan.com/blog/10-common-software- security-weaknesses/ Damaj, I., & Kasbah, S. (2018). An analysis framework for hardware and software implementations with applications from cryptography. Computers & Electrical Engineering, 69, 572– 584. https://doi.org/10.1016/j.compeleceng.2017.06.008 Kin Fun Li, & Narges Attarmoghaddam. (2018, May). Challenges and Methodologies of Hardware Security. ResearchGate; unknown. https://www.researchgate.net/publication/327009189_Challenge s_and_Methodologies_of_Hardware_Security The benefits of software systems. (2019). Www.cs.uct.ac.za. https://www.cs.uct.ac.za/mit_notes/software/htmls/ch01s07.html