Methods for Preventing Security Vulnerabilities in Software Systems

Authors

  • E.E. Abbasov Azerbaijan State Oil and Industry University

DOI:

https://doi.org/10.52171/herald.412

Keywords:

software security, cryptography, security vulnerabilities, risk analysis, information systems

Abstract

This paper investigates methods for preventing security vulnerabilities in software systems and analyzes architectural and cryptographic mechanisms used to ensure information security. The rapid growth of digital services and information systems has significantly increased the importance of software security. The study proposes a multi-layered security approach aimed at reducing vulnerabilities in software applications. The proposed approach integrates secure programming practices, cryptographic protection mechanisms, and security monitoring techniques. Various data protection methods, including symmetric and asymmetric encryption algorithms as well as cryptographic hash functions, are examined. Mathematical models and risk assessment techniques are applied to evaluate potential security threats and vulnerabilities within software environments. In addition, statistical and analytical approaches are used to evaluate the effectiveness of implemented security mechanisms. The analysis demonstrates that the application of cryptographic methods and secure development practices significantly reduces the number of security vulnerabilities in software systems. The proposed framework contributes to improving system reliability, strengthening information protection, and enhancing the overall security level of modern information systems.

References

1. OWASP Foundation, Secure Coding Practices Quick Reference Guide, 2020, pp. 3–8.

2. NIST, Guide for Conducting Risk Assessments, NIST Special Publication 800-30, 2012, pp. 10–15.

3. NIST, Advanced Encryption Standard (AES), FIPS 197, 2001, pp. 1–10.

4. Schneier, B., Applied Cryptography: Protocols, Algorithms and Source Code in C, Wiley, 1996, pp. 466–472.

5. Stallings, W., Cryptography and Network Security: Principles and Practice, Pearson, 2017, pp. 350–360.

6. Sadigov Ulfat. Development and Preparation of Information Security Methods, Herald of the Azerbaijan Engineering Academy, 2026, ONLINE, pp. 1–13,

https://doi.org/10.52171/herald.347

Published

2026-03-30

How to Cite

Abbasov, E. (2026). Methods for Preventing Security Vulnerabilities in Software Systems . Herald of Azerbaijan Engineering Academy, 18(1), 1–7. https://doi.org/10.52171/herald.412

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.