iTnews
  • Home
  • Features
  • Technology
  • Security

Security starts with coding

By Brad Arkin on Jan 11, 2006 10:20PM
Security starts with coding

A mix of regulatory requirements coupled with front-page news stories regarding security breaches worldwide have unveiled an array of application security issues.

Many of the techniques for secure coding have been left out of courses for software developers. Without proper knowledge of how to build secure software, programmers run the risk of jeopardizing development projects.

Whatever the programmer's experience, all developers must focus on the security risks introduced during the development process and apply security principles specific to the programming languages, operating systems and technology they use.

It is less expensive and less disruptive to discover design-level vulnerabilities during the design, rather than discovering them during implementation or testing, forcing a costly redesign of pieces of the application.

Proper training on how to capture security requirements along with the more familiar functional requirements goes a long way in helping a team deliver an application with security that is "good enough." When the application's design is under development, threat modeling and the integration of necessary security countermeasures prove vital to the secure development lifecycle. Developers need instruction on how to exercise the countermeasures during the development test phase to verify the application does not make private information vulnerable to potential attackers.

Although security is not always a priority during the application development lifecycle, a training program for a development team on how to integrate security into the lifecycle can avoid costly headaches in the future.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
codingsecuritystartswith

Partner Content

Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Brad Arkin
Jan 11 2006
10:20PM
0 Comments

Related Articles

  • Twilio phish sees Signal users' numbers at risk of re-registering
  • ACCC greenlights Google's buy of Mandiant
  • Patch Wednesday fixes two-year-old Dogwalk vulnerability
  • Twilio phishers went after Cloudflare, but failed
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia sets changeover date for myGov

Services Australia sets changeover date for myGov

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NBN Co proposes to axe CVC across all plans by mid-2026

NBN Co proposes to axe CVC across all plans by mid-2026

Wesfarmers to stand up offensive cyber security capabilities

Wesfarmers to stand up offensive cyber security capabilities

Digital Nation

Australia will lose 11 percent of jobs to automation by 2040: Forrester
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Metaverses on the agenda for Dominello, Husic ministerial meeting
Metaverses on the agenda for Dominello, Husic ministerial meeting
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
Criteo to fork out $94.7m for consent breaches
Criteo to fork out $94.7m for consent breaches
Domino’s invests in observability for zero contact delivery
Domino’s invests in observability for zero contact delivery
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.