Software security Core software security Hardware security software design Code security Old-age security Database security Life security software reuse Software defined security