Software Systems are used to do many things, to manage, to control, to
communicate, to report, to design, to manufacture and to learn. Most of the
available software systems do not implement any security policy to protect user
access or data. Small subset of software uses ordinary login to control user
access, other subset uses trivial data protection or hiding mechanisms.
Weak security implementation could lead to many legal and financial problems.
Digital attacks may come from inside or outside the enterprise. Criminals may
attack enterprises software systems manually or automatically using professional
hacking tools. There is no way to stop the hacking activities even with
magnificent virus and spyware scanners. New hacking software and viruses are
developed every day and can penetrate many enterprises before they are
With huge number of computers and the installed software systems, there are many
of weak points and thousands of alternatives for any attacker.
Recent studies recommend using hardware authentication devices to protect user
access to any software service; also they recommend using hardware encryption to
protect data files and sensitive information. Using external hardware devices
prevent any malware program from spying or emulating or stopping the hardware