Source |
CodingSec |
Identifiant |
3319 |
Date de publication |
2016-06-24 16:00:26 (vue: 2016-06-24 16:00:26) |
Titre |
Top 10 Security Coding Pratices |
Texte |
Validate input. Validate input from all un-trusted data sources. property of input validation can eliminate the vast majority of softwares vulnerabilitie. Be suspicious of most external data’s sources, including command-line arguments, networking interfaces, environmental variable, and user controlled file. Heed compiler warnings. Compile code using the many highest warning level available for your compiler and to eliminate warnings by modifying the codes . Use static and dynamic analysis of tools to detecting and eliminate additional securityflaws. Architect and design for security policies. Create a software architecture and design your software to implement and enforce security policies. For example, if your system requires |
Envoyé |
Oui |
Condensat |
additional all analysis appeared architect architecture arguments available can code codes coding command compile compiler controlled create data data’s design detecting dynamic eliminate enforce environmental example external file first from heed highest implement including input interfaces level line majority many modifying most networking policies post pratices property requires security securityflaws software softwares vulnerabilitie sources static suspicious system tools top trusted use user using validate validation variable vast warning warnings your |
Tags |
|
Stories |
|
Notes |
|
Move |
|