The possibilities of ensuring the security of the software product in the conditions of unauthorized access Cover Image

The possibilities of ensuring the security of the software product in the conditions of unauthorized access
The possibilities of ensuring the security of the software product in the conditions of unauthorized access

Author(s): Anton Dziatkovskii, Uladzimir Hryneuski
Subject(s): Criminology, ICT Information and Communications Technologies
Published by: Institute of Society Transformation
Keywords: Security; Software Product; Unauthorized Access; Economic Security; Information; GERT; Cyberattack;

Summary/Abstract: Ensuring the security of a software product in the conditions of large companies, taking into account confidential financial and corporate data, is quite an urgent topic in 2021-2023. Over the past year, the number of leaks of confidential information reached a historic peak, together with cyber attacks, and amounts to 114 identified cases. In modern conditions, software security testing is aimed at identifying security errors and design flaws at all stages of the software development lifecycle. At the same time, at the design stage, this type of work should be provided in order to facilitate the implementation of these characteristics in the final version of the security-related system. Research has shown that there is a wide range of opportunities for developing and using security testing software. These options may differ in implementation technologies, cost and other tactical and technical indicators, characteristics of individual elements, and so on. The main task of developing a software security testing method is to develop, improve and select models, methods and tools that belong to a subset and provide maximum software security indicators. Our approach allows us to prevent any penetration into the information system, while maintaining 100% security of confidential files and the system as a whole. The threat prevention model works with the help of proactive technology, and if you calculate the economic effect of these measures, it can be different, depending on the value of the enterprise’s information itself, and can also be calculated in millions of US dollars. The reliability of the results of mathematical modelling of technologies for creating and implementing «penetration testing» tools is evaluated. The experimental results showed that for all the studied data types, the confidence probability that the value of the statistical value «does not deviate» from the mathematical expectation by more than 1 is 0.94.

  • Issue Year: 189/2021
  • Issue No: 5-6(1)
  • Page Range: 90-100
  • Page Count: 11
  • Language: English