Security Software Information
Security software is used to restrict access to data, files, and users on a computer or server.
Wireless network security
How it Works
Most network security software include packet sniffers and loggers for tracking potentially malicious traffic. These system administration products use a combination of hardware and software to prevent such traffic from entering the network. For example, security specialists often implement firewall server software that is designed to open or close certain ports; configure black, white, and gray lists for email; and act as a DMZ (demilitarized zone) between the Internet and an external network.
Wireless networks use a common security software configuration model called wired equivalency privacy (WEP) to prevent hacking into wireless access points and tunneling into wireless network ports.
Email and Internet
Security software provides protections for e-mail and Internet access. Email security software can include antivirus applications that scan HTML-based emails and email attachments for worms, Trojans, and malicious scripts.
Common types of Internet security software use anti-phishing applications to prevent the logging of personal information in an unsecured or malicious Web site.
Anti-spyware software provides protection against:
Malicious startup scripts
Exploits (e.g., buffer overflow handling)
Browser help object (BHO) threats
Application security is a highly desirable feature in security software products. Systems administrators use data encryption software to protect corporate information stored by applications within a database. This type of software generally uses an algorithm of combined security features including user names, passwords, and encryption keys to insure that only authorized users have access to sensitive datasets.
One specific type of data encryption involves the use of secure content management software to protect content management systems that contain sensitive information. A common application of such software is on corporate intranets.
Most security software products are supplied as solution suites that can provide modular or comprehensive (all-inclusive) toolsets. Costs vary based on the level of modularization and customization required.
BS ISO/IEC 27002 - Information Technology - security techniques - code of practice for information security controls.
Image Credit: GE Digital Energy