Defense mechanisms (firewalls/IDS/IPS)
Description
Since the internet boom security is a growing concern. Software developers got more and more aware of the security threats posed upon their software systems. They began to implement development and testing practices to make their code more and more secure.
On a system and network level various appliances and software has been developed to prevent intrusion and attacks. Firewalls form the front line of defense against unwanted connections; other systems like Intrusion Detection Systems examine web traffic on a deeper level. Virus scanners and malware removers scan computers for malicious software and remove them. Most critical systems are not connected to the internet to prevent attacks from the outside.
Authentication methods are developed to identify the person accessing a system. These have evolved over the years and are becoming stronger and harder to bypass.
Enablers
Offensive tools
Software Architecture
Development of Computer Science
Budget
Awareness of risks
Inhabitors
Budget
Complexity of bugfree software
Knowledge of vulnurabilities
Paradigms
There is a growing awareness of vulnurabilities in software and nowadays security is high on the agenda of software development and architecture.
Experts
Sources for additional information about this driving force. (if you have found people, put the links to them)