Part 1 (Ghostware)
It is essential to determine how unintended software is installed on user systems with only marginal adherence to policies. By understanding the process, a security professional can better ensure that only software built to acceptable standards is installed and maintained on systems under their purview.
Using an Internet search engine, identify three sources of unintended software that could be installed on a user’s machine.
In a 500- to 750-word essay, describe the type and risks of the executable programs and adware to the user. Explain why this is legal. Then, share your personal experience related to what happens when software has negative, unintended side effects from unanticipated installation. Who is to blame, the software developer or user? It might be perfectly okay legally when there is no malice aforethought, but how would you explain this when humans are considered as God’s image bearer? How would you relate it to human value and dignity?
Part 2 (Software Factory)
It is necessary to explore all of the stakeholders involved within a software’s development to understand the pedigree of the software from a security standpoint. This will then allow a security professional to make informed decisions toward risk management.
Explore where and how the Adobe reader software is developed. In 500-750 words, report your findings. Make sure to address the following:
1. Where does Adobe indicate their product is located/headquartered?
2. Where is the software really developed and by whom?
3. How many are involved in the development of Adobe and what threat might that pose to end users?
4. What best practices should be considered during the development of the software to reduce security issues in reference to Software Development Life Cycle (SDLC)?
Prepare this assignment according to the guidelines found in the APA Style Guide