Software Risks

Security event logging

Provide a tamper-resistant audit trail for security-related events, such as software installation, user authentication, and so on).

[ Read More ]

Least operating system privilege

The least-privilege principle calls for the operating system to grant programs/ processes only those privileges required for them to carry out their specified functions.

[ Read More ]

Non executable data pages

Storage is divided into code segments that might be read or executed but not written and into data segments that might be read or written but not executed.

[ Read More ]

Secure random numbers

Generating random numbers for use in initializing pseudorandom number generators and cryptographic algorithms, using them correctly, and avoiding reusing them are challenging problems.

[ Read More ]