Title of article :
Secure Coding Guidelines — Python
Author/Authors :
Hammoudeh ، Mohammad Ali A. Department of Information Technology - College of Computer - Qassim University , Ibrahim ، Renad Department of Information Technology - College of Computer - Qassim University , Alshraryan ، Lama Department of Information Technology - College of Computer - Qassim University , Alnomise ، Manar Department of Information Technology - College of Computer - Qassim University , Alhumidan ، Ragad Department of Information Technology - College of Computer - Qassim University
Abstract :
Recently, the interest in cybercrime and cybersecurity has increased dramatically both in terms of critical security issues and national economic information infrastructure and sensitive dealing policies, such as protection and data privacy. Moreover, the growing threat of cybersecurity has prompted the kingdom to pay more attention to its national cybersecurity strategy as the state embarks on a Vision 2030 plan, which aims to diversify the economy and create new jobs. Therefore, Any Computer system is always having security threats which are considered a big problem, and this includes application Codes as increasing demand. The paper aims to give detailed information about secure coding with Python and present security guidelines and considerations in di erent disciplines. It focuses on giving an overview of the authentication methods used in the application (Code) and showing program security mistakes to introduce vulnerabilities (Ex. SQL Injection). We review the new user authentication techniques, making it easier for the manager to choose the appropriate techniques for his organization by understanding the way it works, its advantages, and disadvantages. The administrator can integrate these mechanisms in a manner that is appropriate for his security plan. This will be useful for programmers and users to keep their codes and applications more secure and viable for usage in sensitive environments.
Keywords :
Cybersecurity , Secure Coding Practices , Coding Guidelines , vulnerabilities , OWSAP , Python Challenges , Sql Injection
Journal title :
ISeCure - The ISC International Journal of Information Security
Journal title :
ISeCure - The ISC International Journal of Information Security