Software Vulnerabilities and Usability Safeguards

The most ubiquitous asset requiring protection is the software component of cyberspace. It is important to understand how businesses use applications and systems to exchange, store, and process information and how businesses derive strategies to preemptively deal with application-related vulnerabilities and vulnerabilities created by the users of those applications.

Historically, dealing with software vulnerabilities has been an “afterthought” for security professionals. Seldom are security professionals involved or aware of what is going on in the software engineering department, and issues related to software vulnerabilities are addressed after the software is deployed through patches or left ...

Get Healthcare Information Technology Exam Guide for CompTIA Healthcare IT Technician and HIT Pro Certifications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.