SlideShare a Scribd company logo
1 of 7
Best Coding Practices
LaDonne White, Manager, Webtrain Inc.
e-Commerce Site
August 31, 2018
-Welcome-
1
Introduction
Security attacks are nowadays focusing on productivity
enhanced software.
Software development need robust security requirements to
deter attacks.
Some vulnerability exist due to human error when coding.
Software development lifecycle need to apply the best coding
practices.
Security attacks are evolving from targeting comprehensively
protected IT network infrastructure to the productivity-
enhanced software or business operations’ applications such as
web-based programs that every user utilize on a daily basis.
Webtrain Inc. uses various software applications to conduct it
business operations and evaluation of the entire software
packages reveal that there are essential requirements that need
to be implemented in order to mitigate against certain attacks.
The software development lifecycle which includes the coding
practices employed by the development team indicate that
certain models such as adequate security testing and hardening
processes are not properly outlined.
2
Objectives of best practices
To develop secure software.
Ensure robust security requirements are implemented in the
software development lifecycle.
Enhance the overall security of the organization.
Mitigate against software-propagated security attacks.
Therefore, it is important that drastic measures be instituted in
the software development lifecycle with all security
requirements and processes being widely considered. In order to
ensure that applications are designed and implemented with
appropriate security requirements, the best coding practices
must be used in addition to ensuring that focus on the security
threats is determined and influenced by the integrated day-to-
day operations and processes of the software. It is imperative to
ensure that the programs that company will develop in future
follow the secure coding guidelines regardless of the device or
model utilized for programming.
3
Purpose
Provide a robust software development lifecycle guide.
Institute best secure coding practices that will enable building
of secure software at first rather than implementing latter
corrective measures.
Limit regular or daily basis security monitoring processes.
Consequently, it is vital that extreme methods be established in
the software development lifecycle with all security
requirements and processes being widely considered.
Note that it is less expensive to build secure software than to
correct security issues after a breach the release and patch cycle
of software security management amounts to lengthy security
processes and regular security monitoring as well as increase in
attack surface. In addition, the objectives and purpose of the
company’s best secure coding practices include implementing
secure software products, enhancing security level, and creating
a reputable brand within the company as well as externally.
4
Resources
OWASP Secure Coding Practices Quick Reference Guide.
Use cases.
Security training and workshops.
The resources that can be used as “reference material” and act
as a beginner’s guideline for new employees include OWASP
Secure Coding Practices Quick Reference Guide, use cases, and
security training and workshops. OWASP secure coding
practices is an informative guide that includes a checklist of
comprehensive coding practices while use case illustrate past
incidents and it is enable one to examine a real world case. On
the other hand, security training and workshops enable
employees to put their theoretical knowledge into practice.
5
Methodology
Threat modeling.
Input validation
Output encoding.
Defense in depth.
Security and quality assurance.
There are various methodology of implementing secure coding
practices such as threat modeling, input validation, output
encoding, defense in depth, and quality assurance.
For instance, threat modeling is the method of the secure
software development life cycle will best serve the team
because it pertains to understanding the underlying software
technology in terms of security requirements, threats and
capability, and means to mitigate including emerging bugs.
6
Conclusion
Security attacks are nowadays focusing on productivity
enhanced software.
Some vulnerability exist due to human error when coding.
Ensure robust security requirements are implemented in the
software development lifecycle in order to mitigate against
software-propagated security attacks.
In most cases, ineffectively built software result from avoidable
circumstances such as human error or use of relatively low
standards of development. This means that human errors are
likely to allow vulnerabilities to exist in a system and which
can be used by attackers to break in to the system using cross-
script attacks.
7
References
Hall, G. M. L. (2017). Adaptive code: Agile coding with design
patterns and SOLID principles.
Hudgens, J. (2017). Skill Up: A Software Developer's Guide to
Life and Career. Packt Publishing.
Campbell, J. (2017). Clean Coding Techniques: Teamwork and
Clean Coding.
Rother, K. (2017). Pro Python best practices: Debugging,
testing and maintenance.
-Thank You-
8
Q 8
A stock pays an annual dividend of $2.50 and that dividend is
not expected to change. Similar stocks pay a return of 10%.
What is P0? (Show workings)
Q9
A stock has just paid a dividend and has declared an annual
dividend of $3.00 to be paid one year from today. The dividend
is expected to grow at a 5% annual rate. The return on equity
for similar stocks is 14%. What is P0? (Show workings)
Q10
What is β and why is it important to investors and issuers of
stock? Describe the behavior of stocks with βs of greater than
one, less than one, and less than zero.
Q11
A company has 30 million shares outstanding trading for $8 per
share. It also has $90 million in outstanding debt. If its equity
cost of capital is 15%, and its debt cost of capital is 9%, and its
effective corporate tax rate is 40%, what is its weighted average
cost of capital? (Show workings)
Q12
What is the difference between capital structure and capital
budgeting? Explain and give an example of a capital structure
decision and an example of a capital budgeting decision.
Q13
(TCO E) A company has the opportunity to do any of the
projects for which the net cash flows per year are shown below.
The company has a cost of capital of 15%. Which should the
company do and why? You must use at least two capital
budgeting methods. Show your work.
Year
A
B
C
0
-300
-100
-300
1
100
50
100
2
100
100
100
3
100
100
100
4
100
100
100
5
100
100
100
6
100
100
100
7
100
200
0

More Related Content

Similar to Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docx

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Taloring A Clouded Data Security Life Cycle Essay
Taloring A Clouded Data Security Life Cycle EssayTaloring A Clouded Data Security Life Cycle Essay
Taloring A Clouded Data Security Life Cycle Essay
Marisela Stone
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Modelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaModelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for Nigeria
IJMTST Journal
 
Software For Software Development Life Cycle
Software For Software Development Life CycleSoftware For Software Development Life Cycle
Software For Software Development Life Cycle
Christina Padilla
 

Similar to Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docx (20)

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Taloring A Clouded Data Security Life Cycle Essay
Taloring A Clouded Data Security Life Cycle EssayTaloring A Clouded Data Security Life Cycle Essay
Taloring A Clouded Data Security Life Cycle Essay
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
SE - Lecture 1 - Introduction to S Engineering.pptx
SE - Lecture 1 - Introduction to S Engineering.pptxSE - Lecture 1 - Introduction to S Engineering.pptx
SE - Lecture 1 - Introduction to S Engineering.pptx
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...
INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...
INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...
 
Building Security in Using CI
Building Security in Using CIBuilding Security in Using CI
Building Security in Using CI
 
The Vital Role of Test Data Management in Software Development.pdf
The Vital Role of Test Data Management in Software Development.pdfThe Vital Role of Test Data Management in Software Development.pdf
The Vital Role of Test Data Management in Software Development.pdf
 
VER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINALVER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINAL
 
Secure software development.pdf
Secure software development.pdfSecure software development.pdf
Secure software development.pdf
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Comprehensive Guide on Software Development Process.pdf
Comprehensive Guide on Software Development Process.pdfComprehensive Guide on Software Development Process.pdf
Comprehensive Guide on Software Development Process.pdf
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Modelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaModelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for Nigeria
 
Software For Software Development Life Cycle
Software For Software Development Life CycleSoftware For Software Development Life Cycle
Software For Software Development Life Cycle
 
What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?
 

More from tangyechloe

BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docxBIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docx
tangyechloe
 
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docxBIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docx
tangyechloe
 
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docxBIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
tangyechloe
 
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docxBIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docx
tangyechloe
 
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docxBio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
tangyechloe
 
Bio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docxBio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docx
tangyechloe
 
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docxBIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
tangyechloe
 
Bio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docxBio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docx
tangyechloe
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docx
tangyechloe
 
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docxBIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
tangyechloe
 
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docx
Billau !  1Alessandro Billau Dr. Daniel Cicenia  C.docxBillau !  1Alessandro Billau Dr. Daniel Cicenia  C.docx
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docx
tangyechloe
 
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docxBIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
tangyechloe
 
Big Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docxBig Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docx
tangyechloe
 
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docxBIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
tangyechloe
 
Big Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docxBig Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docx
tangyechloe
 
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docxbibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
tangyechloe
 

More from tangyechloe (20)

BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docxBIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docx
 
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docxBIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docx
 
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docxBIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
 
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docxBIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docx
 
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docxBio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
 
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docxBio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
 
Bill is a young professional who comes to you for help. He earns a v.docx
Bill is a young professional who comes to you for help. He earns a v.docxBill is a young professional who comes to you for help. He earns a v.docx
Bill is a young professional who comes to you for help. He earns a v.docx
 
Bio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docxBio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docx
 
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docxBIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
 
Bio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docxBio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docx
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docx
 
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docxBIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
 
billy rich and Michael million are two very wealthy, elderly men. si.docx
billy rich and Michael million are two very wealthy, elderly men. si.docxbilly rich and Michael million are two very wealthy, elderly men. si.docx
billy rich and Michael million are two very wealthy, elderly men. si.docx
 
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docx
Billau !  1Alessandro Billau Dr. Daniel Cicenia  C.docxBillau !  1Alessandro Billau Dr. Daniel Cicenia  C.docx
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docx
 
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docxBIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
 
Big Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docxBig Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docx
 
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docxBIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
 
Big Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docxBig Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docx
 
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docxbibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
 
Big data in media and digital  PlatformsResearch Paper Format.docx
Big data in media and digital  PlatformsResearch Paper Format.docxBig data in media and digital  PlatformsResearch Paper Format.docx
Big data in media and digital  PlatformsResearch Paper Format.docx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docx

  • 1. Best Coding Practices LaDonne White, Manager, Webtrain Inc. e-Commerce Site August 31, 2018 -Welcome- 1 Introduction Security attacks are nowadays focusing on productivity enhanced software. Software development need robust security requirements to deter attacks. Some vulnerability exist due to human error when coding. Software development lifecycle need to apply the best coding practices. Security attacks are evolving from targeting comprehensively protected IT network infrastructure to the productivity- enhanced software or business operations’ applications such as web-based programs that every user utilize on a daily basis. Webtrain Inc. uses various software applications to conduct it business operations and evaluation of the entire software packages reveal that there are essential requirements that need to be implemented in order to mitigate against certain attacks. The software development lifecycle which includes the coding practices employed by the development team indicate that certain models such as adequate security testing and hardening processes are not properly outlined. 2
  • 2. Objectives of best practices To develop secure software. Ensure robust security requirements are implemented in the software development lifecycle. Enhance the overall security of the organization. Mitigate against software-propagated security attacks. Therefore, it is important that drastic measures be instituted in the software development lifecycle with all security requirements and processes being widely considered. In order to ensure that applications are designed and implemented with appropriate security requirements, the best coding practices must be used in addition to ensuring that focus on the security threats is determined and influenced by the integrated day-to- day operations and processes of the software. It is imperative to ensure that the programs that company will develop in future follow the secure coding guidelines regardless of the device or model utilized for programming. 3 Purpose Provide a robust software development lifecycle guide. Institute best secure coding practices that will enable building of secure software at first rather than implementing latter corrective measures. Limit regular or daily basis security monitoring processes. Consequently, it is vital that extreme methods be established in the software development lifecycle with all security requirements and processes being widely considered. Note that it is less expensive to build secure software than to correct security issues after a breach the release and patch cycle of software security management amounts to lengthy security processes and regular security monitoring as well as increase in
  • 3. attack surface. In addition, the objectives and purpose of the company’s best secure coding practices include implementing secure software products, enhancing security level, and creating a reputable brand within the company as well as externally. 4 Resources OWASP Secure Coding Practices Quick Reference Guide. Use cases. Security training and workshops. The resources that can be used as “reference material” and act as a beginner’s guideline for new employees include OWASP Secure Coding Practices Quick Reference Guide, use cases, and security training and workshops. OWASP secure coding practices is an informative guide that includes a checklist of comprehensive coding practices while use case illustrate past incidents and it is enable one to examine a real world case. On the other hand, security training and workshops enable employees to put their theoretical knowledge into practice. 5 Methodology Threat modeling. Input validation Output encoding. Defense in depth. Security and quality assurance. There are various methodology of implementing secure coding practices such as threat modeling, input validation, output encoding, defense in depth, and quality assurance.
  • 4. For instance, threat modeling is the method of the secure software development life cycle will best serve the team because it pertains to understanding the underlying software technology in terms of security requirements, threats and capability, and means to mitigate including emerging bugs. 6 Conclusion Security attacks are nowadays focusing on productivity enhanced software. Some vulnerability exist due to human error when coding. Ensure robust security requirements are implemented in the software development lifecycle in order to mitigate against software-propagated security attacks. In most cases, ineffectively built software result from avoidable circumstances such as human error or use of relatively low standards of development. This means that human errors are likely to allow vulnerabilities to exist in a system and which can be used by attackers to break in to the system using cross- script attacks. 7 References Hall, G. M. L. (2017). Adaptive code: Agile coding with design patterns and SOLID principles. Hudgens, J. (2017). Skill Up: A Software Developer's Guide to Life and Career. Packt Publishing. Campbell, J. (2017). Clean Coding Techniques: Teamwork and Clean Coding. Rother, K. (2017). Pro Python best practices: Debugging, testing and maintenance.
  • 5. -Thank You- 8 Q 8 A stock pays an annual dividend of $2.50 and that dividend is not expected to change. Similar stocks pay a return of 10%. What is P0? (Show workings) Q9 A stock has just paid a dividend and has declared an annual dividend of $3.00 to be paid one year from today. The dividend is expected to grow at a 5% annual rate. The return on equity for similar stocks is 14%. What is P0? (Show workings) Q10 What is β and why is it important to investors and issuers of stock? Describe the behavior of stocks with βs of greater than one, less than one, and less than zero. Q11 A company has 30 million shares outstanding trading for $8 per share. It also has $90 million in outstanding debt. If its equity cost of capital is 15%, and its debt cost of capital is 9%, and its effective corporate tax rate is 40%, what is its weighted average cost of capital? (Show workings) Q12 What is the difference between capital structure and capital budgeting? Explain and give an example of a capital structure decision and an example of a capital budgeting decision. Q13
  • 6. (TCO E) A company has the opportunity to do any of the projects for which the net cash flows per year are shown below. The company has a cost of capital of 15%. Which should the company do and why? You must use at least two capital budgeting methods. Show your work. Year A B C 0 -300 -100 -300 1 100 50 100 2 100 100 100 3 100 100 100 4 100 100 100 5 100 100 100 6 100 100