EFY Times  
Monday, August 31, 2015

 
GO
 
 
10 Tips For Developers To Secure And Safeguard Code
 
Home >> Infotech >> Features
 
10 Tips For Developers To Secure And Safeguard Code  
 
EFYTimes takes a look at some ways programmers can safeguard their code.   
Rate this news:  (0 Votes)
Friday, November 15, 2013 With the increasing number of breaches in security with respect to credit card, mobile etc it is becoming imperative that we do all that we can to safeguard our property. So is the case with software developers.

Security, Code, Developers, Safeguarding, Breaches, Inputs, Avoid, Passwords,  Delays, Storing.




As cited on cio.com, here are 10 things they can do to keep their codes secure -

1. Testing inputs rigorously - Attackers require a path into your machines, and the easiest path is via the doors your code opens. In the event that your software derives input from the Internet, you are likely to have something come past you. You must ensure to test the size and structure of the incoming data and never rely on the person on the other end of the Internet.

2. Storing only what you require, and not a bit more – You must rethink regarding where to store your home or business addresses for sending emails. This time up a lot of time to process as well as disk space and makes an attractive target for information thieves. Whenever in doubt you must make the forms shorter and the database tables smaller.

3. Avoid over- reliance on passwords - Everyone is aware of the issue with passwords with no one having a better solution. You can add security by using special hardware that locks up cryptographic keys. They may be costly but easier to lose than a cellphone.

4. Negotiating requirements – Making secure code is not just something that happens in the code editor. A feature may be great but it may induce you to take stock of extra sensitive information and increase the level of security required everywhere. The apt time for securing your code against future breaches is when the requirements document is still flexible.

5. Adding delays to your code -Many attacks rely on sending millions of queries while others on trying trillions of passwords till the right one is found. You must add progressively more delays to confound these bots. You need to have your software to be fast enough to support the right humans but very slow for attacking bots to accomplish much.

6. Using encryption more frequently than you should -Encryption is often underutilized as it adds yet another step to the machinery and makes debugging that much harder. You must lock up personal data before storing it in the database to save you from a lot of worries.

7. Constructing walls – User friendliness should not lead to linking everything to a single portal. There is no simple way to decide how simple it should be for a user to navigate through the system and get what they want with a click. The easier it is for the legitimate user, the easier it is for the attackers.

8. Testing libraries -- Encryption is difficult to perfect and even the best theory and carefully built code can come with gaps. It is important to have well-tested libraries in this area than others. You must opt for a better code here and not inventing your own algorithms.

9. Using internal APIs - APIs is an old more valuable for security as it can make it simpler to audit interactions, find holes, and fix problems. It is logical to make internal sub-modules and the same idea applies inside of modules as well. Parts are easy to analyze.

10. Bringing outside auditors to critique your code - If an enterprise invests in a well-designed base, it should also invest in code audits that can identify flaws and give suggestions for improving the code.




Print Email Post Comment 
(Total Views: 2217)
 
Share

 
 
Infotech News
   
Design Touch Sensing Applications With Low Cost And Feature Rich MCU
Single Integrated Environment to Develop Code for Embedded Microcontrollers
Swipe Your Finger To Unlock A Smartphone
Verical.com Doubles Stock As Site Redesign Progresses
4G and 5G Smartphones With 10x Improved Performance
 
 
 
     
     
     
     
     
     
Most popular
 

Daily

Telegram App 2.0 To Release Next Month
M2 Marketing And Management Announces Partnership With Gibson Innovations To Promote Integrated Fitness Headphones
Larson Electronics Releases Explosion Proof LED Light With 250’ Cord And Explosion Proof Plug
nQueue Simplifies Scanning With iA Scan Desktop
Nextiva Receives 2015 Communications Solutions Product Of The Year Award Nextiva Office Recognized For Exceptional Innovation In The Cloud Communicat
Lithium Boost Technologies Announces New Release Of Its Smart Lithium-Ion Battery Chargers For Low Speed Electric Vehicles (LSEV)
SanDisk Introduces New All-Flash Reference Architectures And Enhanced Portfolio Of Certified Flash Products For VMWare Virtual SAN 6
USGS Evaluates Sigma Space’s Single Photon LiDAR As A Key Technology For Its 3D Digital Elevation Program
Panasonic Announces Pricing/Availability For AG-DVX200PJ 4K Handheld Camcorder
Seagate Seven Honored With Gold By The Industrial Design Society Of America’s 2015 International Design Excellence Award
 
   

Weekly

Top Five File Managers For Linux
Top Five File Managers For Linux
Now Water Your Lawn Using Raspberry Pi
Chinese Hackers To Attack India
Would You Design A Hydrogen Fuel Cell Into Your Device?
Download Mozilla's Open Source Furniture To Furnish Your Office At Low Cost
Speech System Used By Stephen Hawking Is Now Open To All
Scientific Linux 6.7 Now Available For Download
IBM Adds Java To Bluemix For Open Source Agility
Share Your Contact With Just A Tap Using Knock Knock
Top 5 Free Ebooks, Movies And Audio Books For Your iPad And Kindle!
Microsoft Launches Beta Cortana App For Android
Latest Microcontrollers Released In The Last 12 Months
How To Root Android
Police Use Vampire Technology To Combat Crime
Ubuntu 16.04 Stupendously Hot Concept Is About
Android 6.0 Marshmallow Update: Which Samsung and HTC
 
   

Overall

Features
Top Four Markup Languages
Formatting and publishing documentation is a crucial part of programmer's life. Markup languages simplify this task....
Top Five File Managers For Linux
File management programs streamline and simplify the process on your computer....
Now Water Your Lawn Using Raspberry Pi
An open source enthusiast, Robert Booth has developed a prototype of lawn watering system....
Download Mozilla's Open Source Furniture To Furnish Your Office At Low Cost
Mozilla and Nosigner are enabling inexpensive office furniture with open source schematic....
Top 5 Free Ebooks, Movies And Audio Books For Your iPad And Kindle!
Here is a list of best free books, movies and audio books from OpenCulture!...
Chinese Hackers To Attack India
A sophisticated cyber espionage group from China is working day and night to steal sensitive diplomatic information....
Speech System Used By Stephen Hawking Is Now Open To All
Intel has released the open source code of the speech system it developed for Stephen Hawking....
Top 4 Command Line Based Email Clients
Once you master one of these clients, you may not want to go back to GUI based clients....
Five Big Data Projects To Watch Out For!
Here are five important Open Source Big Data projects that you may not know about....
Top Five Community Tools
Top-notch tools can help in growth and maintenance of communities that make real difference....
Top Five Open Source E-Commerce Platforms
Establishing online presence of your business is very simple with these platforms....
Five Things You Need To Know About BLE
Bluetooth Low Energy (BLE) Technology is set to improve the lifestyle of consumers....
LibreOffice 5.0 Brings Major Performance Changes
LibreOffice 5.0 proves to be the best free alternative to Microsoft Office. ...
Five Must-Have Apps For Chromebook
You can also install and use these apps on Chrome browser on any OS....
Top Five Linux Based Mobile Operating Systems
Open source operating systems are ruling the computing world. ...
 
  View All
Dialogue
 
Meet Pranjal Saxena, India's 21 Year Old Electronics Wizard
Milan Ondhia of EFYTimes was in a forthright conversation with the 21 year old Pranjal Saxena from New Delhi; an aspirant at the WorldSkills meet, in ...
“We Offer Managed Document Solutions To CIO And IT Decision Makers”: Canon
Manufacturing within the country will surely reduce the cost of our devices, but manufacturing can begin only if there is the desired eco-system and w...
“One Day The End User Can Open Up A Used Battery, And Use What’s Inside As Barbecue Sauce”
Of course that is not something currently possible, but what B&B Batteries does have are some secret recipes for their very specialised battery design...
We Wish To Procure All The LED Components Within India: Avni Energy
G. Gururaja, director, Avni Energy Solutions Pvt Ltd, shares his views about the expanding LED industry in the Indian market and the company's plans i...
We Have Registered 50 Per Cent Growth In The Last Two Years: Arihant Lighting
Apart from LEDs, Arihant is associated with the promotion of renewable energy in India and therefore, manufactures various energy saving products....
   
  View All
Videos
 
First Look: LG Optimus G
The phone sports a high-end display and comes powered by a powerful processor. ...
Create QR-Codes For Free
TEC-IT releases the freeware QR-Code Studio to provide a quick and convenient way of QR code creation for every application scenario....
DoT Secretary Shares Plans For Growth Of Telecom Sector
M.F. Farooqui has recently taken charge as secretary, Department of Telecom....
Hands-On: Sony Xperia Z
Xperia Z is Sony's first entrant model in the big-screen smartphone category. ...
Hands On: Videocon A30 Smartphone
Videocon, the consumer electronics company which is known for its refrigerators, washing machine and air-conditioner has unveiled its Android-based sm...
   
View All
   
 
IFA 2014
 
IFA 2014: LG Launches 34-Inches Curved Monitor
The company is yet to confirm price and availability of the device....
IFA 2014: Intel Launches First Core M Range Of Processors
This range of processors is tailor-made for 2-in-1 devices which include a tablet and a laptop....
MWC 2014: Tablet Lets People Feel Textures On Its Screen
Now feel what you see on your tablet, by way of ultrasonic waves....
MWC 2014: 4K Android Tablet Games To Kill Consoles, iPad
Tablet makers like Samsung want to beat the iPad by making 4K tabs. ...
MWC 2014: This Vodafone Backpack Helps Get Network In Disaster Situations
Two engineers of Vodafone New Zealand displayed the "mini" mobile network by Vodafone substructure in a backpack. ...
MWC 2014: Wilocity Chipset To Bring 'Lightening' Speed To Mobile Phones
Wilocity has developed a WiGig chipset for mobile phones that will bring lightning-fast wireless capability ...
MWC 2014: Samsung Introduces Octacore, Hexacore Chipsets
The Korean giant, Samsung unveiled two new octacore and hexacore chipsets at MWC 2014, in Barcelona. The company previously used Exynos 5 Octa 5410 ch...
   
View All
   
 
Events
 
19th Consumer Electronic Imaging Fair To Be Held On ...

View All
   
   
 
 

home archives contact us advertise with us
           
Magazines Portals Directories Events News Verticals Educational Institute  
Electronics for You
Open Source for You
Electronics Bazaar
electronicsforu.com
efytimes.com
opensourceforu.com
electronicsb2b.com
Electronics Annual Guide
EFY EXPO INDIA
EFY EXPO WEST
ELECTRONICS ROCKS
EFY Awards
OSIDAYS Expo
Electronics
Infotech
Linux & Open Source
Consumer Electronics
Science & Technology
BPO
EFY Techcenter

Educational Kits
Kitsnspares.com  
 
 
© Copyright 2015 EFY Enterprises Pvt. Ltd.
All rights reserved. Reproduction in whole or in part in any form or medium without written permission is prohibited.
Usage of the content from the web site is subject to Terms and Conditions