Security Software Information



Security software is used to restrict access to data, files, and users on a computer or server.



Security Software InformationTypes


Products include:

  • Firewalls
  • Antivirus software
  • Anti-spyware
  • Anti-phishing software
  • LAN/WAN security
  • Data encryption
  • Wireless network security


How it Works 




Most network security software include packet sniffers and loggers for tracking potentially malicious traffic. These system administration products use a combination of hardware and software to prevent such traffic from entering the network. For example, security specialists often implement firewall server software that is designed to open or close certain ports; configure black, white, and gray lists for email; and act as a DMZ (demilitarized zone) between the Internet and an external network. 


Wireless networks use a common security software configuration model called wired equivalency privacy (WEP) to prevent hacking into wireless access points and tunneling into wireless network ports. 


Email and Internet


Security software provides protections for e-mail and Internet access. Email security software can include antivirus applications that scan HTML-based emails and email attachments for worms, Trojans, and malicious scripts. 


Common types of Internet security software use anti-phishing applications to prevent the logging of personal information in an unsecured or malicious Web site. 


Anti-spyware software provides protection against:

  • Malicious startup scripts
  • Exploits (e.g., buffer overflow handling)
  • Browser help object (BHO) threats
  • Keyloggers
  • Pop-up ads
  • Adware injectors 



Application security is a highly desirable feature in security software products. Systems administrators use data encryption software to protect corporate information stored by applications within a database. This type of software generally uses an algorithm of combined security features including user names, passwords, and encryption keys to insure that only authorized users have access to sensitive datasets.


One specific type of data encryption involves the use of secure content management software to protect content management systems that contain sensitive information. A common application of such software is on corporate intranets.

Purchasing Options


Most security software products are supplied as solution suites that can provide modular or comprehensive (all-inclusive) toolsets. Costs vary based on the level of modularization and customization required.





BS ISO/IEC 27002 - Information Technology - security techniques - code of practice for information security controls.





Image Credit: GE Digital Energy



Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

Category: Security Software
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.