Part 4 Software 1 Part IV: Software Part 4 Software 2 Why Software? Why is software as important to security as crypto, access control, protocols? Virtually.