Strategies-for-Securing-Software-from-External-Threats