Methods for Preventing Security Vulnerabilities in Software Systems
DOI:
https://doi.org/10.52171/herald.412Keywords:
software security, cryptography, security vulnerabilities, risk analysis, information systemsAbstract
This paper investigates methods for preventing security vulnerabilities in software systems and analyzes architectural and cryptographic mechanisms used to ensure information security. The rapid growth of digital services and information systems has significantly increased the importance of software security. The study proposes a multi-layered security approach aimed at reducing vulnerabilities in software applications. The proposed approach integrates secure programming practices, cryptographic protection mechanisms, and security monitoring techniques. Various data protection methods, including symmetric and asymmetric encryption algorithms as well as cryptographic hash functions, are examined. Mathematical models and risk assessment techniques are applied to evaluate potential security threats and vulnerabilities within software environments. In addition, statistical and analytical approaches are used to evaluate the effectiveness of implemented security mechanisms. The analysis demonstrates that the application of cryptographic methods and secure development practices significantly reduces the number of security vulnerabilities in software systems. The proposed framework contributes to improving system reliability, strengthening information protection, and enhancing the overall security level of modern information systems.
References
1. OWASP Foundation, Secure Coding Practices Quick Reference Guide, 2020, pp. 3–8.
2. NIST, Guide for Conducting Risk Assessments, NIST Special Publication 800-30, 2012, pp. 10–15.
3. NIST, Advanced Encryption Standard (AES), FIPS 197, 2001, pp. 1–10.
4. Schneier, B., Applied Cryptography: Protocols, Algorithms and Source Code in C, Wiley, 1996, pp. 466–472.
5. Stallings, W., Cryptography and Network Security: Principles and Practice, Pearson, 2017, pp. 350–360.
6. Sadigov Ulfat. Development and Preparation of Information Security Methods, Herald of the Azerbaijan Engineering Academy, 2026, ONLINE, pp. 1–13,
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 E.E. Abbasov

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

