Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,159,209 members, 7,839,117 topics. Date: Friday, 24 May 2024 at 02:02 PM

Best Tips For Safe Programming - Education - Nairaland

Nairaland Forum / Nairaland / General / Education / Best Tips For Safe Programming (307 Views)

6 Best Tips For pre-intimacy That Will Make Her Go Crazy In Bed / 10 Best Tips For Studying At Night Without Sleeping / COVID-19: FG Releases Guidelines For Safe Re-opening Of Schools (DOWNLOAD) (2) (3) (4)

(1) (Reply)

Best Tips For Safe Programming by leviya: 12:35pm On Dec 07, 2017
Technological security threats around the world are increasing gradually. Where before it was simply individual credit card numbers being stolen, now it seems almost every day there’s another story of severe breaches where millions of financial records are exposed, like the recent Experian discovery.

Writing secure code is not an easy task. In order to approximate bulletproof code, managers, auditors, engineers, and architects imagine everything that could go wrong with every facet of the code. Though it is not possible to predict every bad curve the hackers will hurl, you must do everything you can to decrease your attack surface, seal holes, and guard against the fallout of a potential breach.

Testing Inputs Rigorously

Attackers require a path into your machine, and the simplest routes are via the doors your own code opens. If your program is connected to the Internet, someone will attempt to sneak something past you through those doors.

Store only what you need

Before you ask for the snail mail address of your customer, ask yourself whether you will send a physical letter to them via the post office, don’t store business or home addresses if email is sufficient for correspondence. The extra information takes up disk space, costs time to process, and makes a target for hackers.

Avoid depending just on passwords

Programs that accept dangerously simple passwords are another problem. Programmers are aware of this issue but haven’t been able to find solutions that offer users an easy and flexible solution.

Negotiate requirements

When developers are considering project requirements, they must consider how those requirements might open the door to security problems down the road. The right time to have this discussion with project managers is at the beginning of development, when you can negotiate those requirements.

Add delays to your code

Many attacks depend on utilizing a bot to relentlessly enter information over and over again, using multiple queries to overwhelm the program. Some bots screen scrape databases, pretending to be a user, while others try multiple potential passwords until the right one is found.

Want To Learn Cyber Security Training From the Experts? Schedule and Attend Free Demo here! Cyber Security Training

(1) (Reply)

Jubilant Ambassadors Foundation JAMB-F SCHOLARSHIP / How To Change Facebook's Theme, Color & Appearance / Why You Should Study On Low Tuition In Japan

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 10
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.