SlideShare a Scribd company logo
1 of 7
Best Coding Practices
LaDonne White, Manager, Webtrain Inc.
e-Commerce Site
August 31, 2018
-Welcome-
1
Introduction
Security attacks are nowadays focusing on productivity
enhanced software.
Software development need robust security requirements to
deter attacks.
Some vulnerability exist due to human error when coding.
Software development lifecycle need to apply the best coding
practices.
Security attacks are evolving from targeting comprehensively
protected IT network infrastructure to the productivity-
enhanced software or business operations’ applications such as
web-based programs that every user utilize on a daily basis.
Webtrain Inc. uses various software applications to conduct it
business operations and evaluation of the entire software
packages reveal that there are essential requirements that need
to be implemented in order to mitigate against certain attacks.
The software development lifecycle which includes the coding
practices employed by the development team indicate that
certain models such as adequate security testing and hardening
processes are not properly outlined.
2
Objectives of best practices
To develop secure software.
Ensure robust security requirements are implemented in the
software development lifecycle.
Enhance the overall security of the organization.
Mitigate against software-propagated security attacks.
Therefore, it is important that drastic measures be instituted in
the software development lifecycle with all security
requirements and processes being widely considered. In order to
ensure that applications are designed and implemented with
appropriate security requirements, the best coding practices
must be used in addition to ensuring that focus on the security
threats is determined and influenced by the integrated day-to-
day operations and processes of the software. It is imperative to
ensure that the programs that company will develop in future
follow the secure coding guidelines regardless of the device or
model utilized for programming.
3
Purpose
Provide a robust software development lifecycle guide.
Institute best secure coding practices that will enable building
of secure software at first rather than implementing latter
corrective measures.
Limit regular or daily basis security monitoring processes.
Consequently, it is vital that extreme methods be established in
the software development lifecycle with all security
requirements and processes being widely considered.
Note that it is less expensive to build secure software than to
correct security issues after a breach the release and patch cycle
of software security management amounts to lengthy security
processes and regular security monitoring as well as increase in
attack surface. In addition, the objectives and purpose of the
company’s best secure coding practices include implementing
secure software products, enhancing security level, and creating
a reputable brand within the company as well as externally.
4
Resources
OWASP Secure Coding Practices Quick Reference Guide.
Use cases.
Security training and workshops.
The resources that can be used as “reference material” and act
as a beginner’s guideline for new employees include OWASP
Secure Coding Practices Quick Reference Guide, use cases, and
security training and workshops. OWASP secure coding
practices is an informative guide that includes a checklist of
comprehensive coding practices while use case illustrate past
incidents and it is enable one to examine a real world case. On
the other hand, security training and workshops enable
employees to put their theoretical knowledge into practice.
5
Methodology
Threat modeling.
Input validation
Output encoding.
Defense in depth.
Security and quality assurance.
There are various methodology of implementing secure coding
practices such as threat modeling, input validation, output
encoding, defense in depth, and quality assurance.
For instance, threat modeling is the method of the secure
software development life cycle will best serve the team
because it pertains to understanding the underlying software
technology in terms of security requirements, threats and
capability, and means to mitigate including emerging bugs.
6
Conclusion
Security attacks are nowadays focusing on productivity
enhanced software.
Some vulnerability exist due to human error when coding.
Ensure robust security requirements are implemented in the
software development lifecycle in order to mitigate against
software-propagated security attacks.
In most cases, ineffectively built software result from avoidable
circumstances such as human error or use of relatively low
standards of development. This means that human errors are
likely to allow vulnerabilities to exist in a system and which
can be used by attackers to break in to the system using cross-
script attacks.
7
References
Hall, G. M. L. (2017). Adaptive code: Agile coding with design
patterns and SOLID principles.
Hudgens, J. (2017). Skill Up: A Software Developer's Guide to
Life and Career. Packt Publishing.
Campbell, J. (2017). Clean Coding Techniques: Teamwork and
Clean Coding.
Rother, K. (2017). Pro Python best practices: Debugging,
testing and maintenance.
-Thank You-
8
Q 8
A stock pays an annual dividend of $2.50 and that dividend is
not expected to change. Similar stocks pay a return of 10%.
What is P0? (Show workings)
Q9
A stock has just paid a dividend and has declared an annual
dividend of $3.00 to be paid one year from today. The dividend
is expected to grow at a 5% annual rate. The return on equity
for similar stocks is 14%. What is P0? (Show workings)
Q10
What is β and why is it important to investors and issuers of
stock? Describe the behavior of stocks with βs of greater than
one, less than one, and less than zero.
Q11
A company has 30 million shares outstanding trading for $8 per
share. It also has $90 million in outstanding debt. If its equity
cost of capital is 15%, and its debt cost of capital is 9%, and its
effective corporate tax rate is 40%, what is its weighted average
cost of capital? (Show workings)
Q12
What is the difference between capital structure and capital
budgeting? Explain and give an example of a capital structure
decision and an example of a capital budgeting decision.
Q13
(TCO E) A company has the opportunity to do any of the
projects for which the net cash flows per year are shown below.
The company has a cost of capital of 15%. Which should the
company do and why? You must use at least two capital
budgeting methods. Show your work.
Year
A
B
C
0
-300
-100
-300
1
100
50
100
2
100
100
100
3
100
100
100
4
100
100
100
5
100
100
100
6
100
100
100
7
100
200
0

More Related Content

Similar to Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docx

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Taloring A Clouded Data Security Life Cycle Essay
Taloring A Clouded Data Security Life Cycle EssayTaloring A Clouded Data Security Life Cycle Essay
Taloring A Clouded Data Security Life Cycle EssayMarisela Stone
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
SE - Lecture 1 - Introduction to S Engineering.pptx
SE - Lecture 1 - Introduction to S Engineering.pptxSE - Lecture 1 - Introduction to S Engineering.pptx
SE - Lecture 1 - Introduction to S Engineering.pptxTangZhiSiang
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesIJNSA Journal
 
INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...
INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...
INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...apidays
 
Building Security in Using CI
Building Security in Using CIBuilding Security in Using CI
Building Security in Using CICoveros, Inc.
 
The Vital Role of Test Data Management in Software Development.pdf
The Vital Role of Test Data Management in Software Development.pdfThe Vital Role of Test Data Management in Software Development.pdf
The Vital Role of Test Data Management in Software Development.pdfRohitBhandari66
 
Secure software development.pdf
Secure software development.pdfSecure software development.pdf
Secure software development.pdfIntuitiveCloud
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
Comprehensive Guide on Software Development Process.pdf
Comprehensive Guide on Software Development Process.pdfComprehensive Guide on Software Development Process.pdf
Comprehensive Guide on Software Development Process.pdfSmith Daniel
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secopsMohammed Ahmed
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxlior mazor
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramCigital
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
Modelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaModelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaIJMTST Journal
 
Software For Software Development Life Cycle
Software For Software Development Life CycleSoftware For Software Development Life Cycle
Software For Software Development Life CycleChristina Padilla
 
What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?BoTree Technologies
 

Similar to Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docx (20)

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Taloring A Clouded Data Security Life Cycle Essay
Taloring A Clouded Data Security Life Cycle EssayTaloring A Clouded Data Security Life Cycle Essay
Taloring A Clouded Data Security Life Cycle Essay
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
SE - Lecture 1 - Introduction to S Engineering.pptx
SE - Lecture 1 - Introduction to S Engineering.pptxSE - Lecture 1 - Introduction to S Engineering.pptx
SE - Lecture 1 - Introduction to S Engineering.pptx
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...
INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...
INTERFACE by apidays 2023 - Secure Software Development Framework (SSDF) & AP...
 
Building Security in Using CI
Building Security in Using CIBuilding Security in Using CI
Building Security in Using CI
 
The Vital Role of Test Data Management in Software Development.pdf
The Vital Role of Test Data Management in Software Development.pdfThe Vital Role of Test Data Management in Software Development.pdf
The Vital Role of Test Data Management in Software Development.pdf
 
VER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINALVER_WP_CrackingCode_FINAL
VER_WP_CrackingCode_FINAL
 
Secure software development.pdf
Secure software development.pdfSecure software development.pdf
Secure software development.pdf
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Comprehensive Guide on Software Development Process.pdf
Comprehensive Guide on Software Development Process.pdfComprehensive Guide on Software Development Process.pdf
Comprehensive Guide on Software Development Process.pdf
 
10 things to get right for successful dev secops
10 things to get right for successful dev secops10 things to get right for successful dev secops
10 things to get right for successful dev secops
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Modelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaModelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for Nigeria
 
Software For Software Development Life Cycle
Software For Software Development Life CycleSoftware For Software Development Life Cycle
Software For Software Development Life Cycle
 
What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?
 

More from tangyechloe

BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docxBIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docxtangyechloe
 
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docxBIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docxtangyechloe
 
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docxBIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docxtangyechloe
 
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docxBIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docxtangyechloe
 
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docxBio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docxtangyechloe
 
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docxBio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docxtangyechloe
 
Bill is a young professional who comes to you for help. He earns a v.docx
Bill is a young professional who comes to you for help. He earns a v.docxBill is a young professional who comes to you for help. He earns a v.docx
Bill is a young professional who comes to you for help. He earns a v.docxtangyechloe
 
Bio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docxBio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docxtangyechloe
 
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docxBIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docxtangyechloe
 
Bio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docxBio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docxtangyechloe
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxtangyechloe
 
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docxBIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docxtangyechloe
 
billy rich and Michael million are two very wealthy, elderly men. si.docx
billy rich and Michael million are two very wealthy, elderly men. si.docxbilly rich and Michael million are two very wealthy, elderly men. si.docx
billy rich and Michael million are two very wealthy, elderly men. si.docxtangyechloe
 
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docx
Billau !  1Alessandro Billau Dr. Daniel Cicenia  C.docxBillau !  1Alessandro Billau Dr. Daniel Cicenia  C.docx
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docxtangyechloe
 
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docxBIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docxtangyechloe
 
Big Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docxBig Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docxtangyechloe
 
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docxBIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docxtangyechloe
 
Big Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docxBig Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docxtangyechloe
 
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docxbibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docxtangyechloe
 
Big data in media and digital  PlatformsResearch Paper Format.docx
Big data in media and digital  PlatformsResearch Paper Format.docxBig data in media and digital  PlatformsResearch Paper Format.docx
Big data in media and digital  PlatformsResearch Paper Format.docxtangyechloe
 

More from tangyechloe (20)

BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docxBIODIVERSITY and HEALTHY POPULATIONSECS111  P DR. SE.docx
BIODIVERSITY and HEALTHY POPULATIONSECS111 P DR. SE.docx
 
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docxBIOC 405 Assignment 1 Dr Moore   Due Friday March 1st, .docx
BIOC 405 Assignment 1 Dr Moore Due Friday March 1st, .docx
 
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docxBIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
BIO34 Human Heredity and Evolution EXTRA CREDIT Paper Prompt .docx
 
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docxBIO120Concepts of BiologyUnit 2 Lecture  Part One Cel.docx
BIO120Concepts of BiologyUnit 2 Lecture Part One Cel.docx
 
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docxBio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
Bio-Assignment02 week two Term 2019 SummerAssignment 2Na.docx
 
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docxBio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
Bio 105- Please answer 50-60 words each.1.Human Exponential Po.docx
 
Bill is a young professional who comes to you for help. He earns a v.docx
Bill is a young professional who comes to you for help. He earns a v.docxBill is a young professional who comes to you for help. He earns a v.docx
Bill is a young professional who comes to you for help. He earns a v.docx
 
Bio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docxBio 209, Dr. Fernandez.Name1.Your ability to .docx
Bio 209, Dr. Fernandez.Name1.Your ability to .docx
 
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docxBIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
BIO 299 PathologyMicrobial-Environmental Interactions Paper.docx
 
Bio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docxBio 211A. Student The allelopathic effects of the .docx
Bio 211A. Student The allelopathic effects of the .docx
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docx
 
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docxBIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
BIO 10 Can Eating Insects Save the WorldDue Monday, Dec 10, .docx
 
billy rich and Michael million are two very wealthy, elderly men. si.docx
billy rich and Michael million are two very wealthy, elderly men. si.docxbilly rich and Michael million are two very wealthy, elderly men. si.docx
billy rich and Michael million are two very wealthy, elderly men. si.docx
 
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docx
Billau !  1Alessandro Billau Dr. Daniel Cicenia  C.docxBillau !  1Alessandro Billau Dr. Daniel Cicenia  C.docx
Billau ! 1Alessandro Billau Dr. Daniel Cicenia C.docx
 
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docxBIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
BIGDATAPrepared ByMuhammad Abrar UddinIntrodu.docx
 
Big Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docxBig Five Personality Short FormThis is an example of an indivi.docx
Big Five Personality Short FormThis is an example of an indivi.docx
 
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docxBIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
BIG IOT AND SOCIAL NETWORKING DATA FOR SMART CITIES Alg.docx
 
Big Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docxBig Data Risks and Rewards (good length and at least 3-4 references .docx
Big Data Risks and Rewards (good length and at least 3-4 references .docx
 
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docxbibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
bibliotecacienciasestudiantesexamenlaboratorioprofesora.docx
 
Big data in media and digital  PlatformsResearch Paper Format.docx
Big data in media and digital  PlatformsResearch Paper Format.docxBig data in media and digital  PlatformsResearch Paper Format.docx
Big data in media and digital  PlatformsResearch Paper Format.docx
 

Recently uploaded

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docx

  • 1. Best Coding Practices LaDonne White, Manager, Webtrain Inc. e-Commerce Site August 31, 2018 -Welcome- 1 Introduction Security attacks are nowadays focusing on productivity enhanced software. Software development need robust security requirements to deter attacks. Some vulnerability exist due to human error when coding. Software development lifecycle need to apply the best coding practices. Security attacks are evolving from targeting comprehensively protected IT network infrastructure to the productivity- enhanced software or business operations’ applications such as web-based programs that every user utilize on a daily basis. Webtrain Inc. uses various software applications to conduct it business operations and evaluation of the entire software packages reveal that there are essential requirements that need to be implemented in order to mitigate against certain attacks. The software development lifecycle which includes the coding practices employed by the development team indicate that certain models such as adequate security testing and hardening processes are not properly outlined. 2
  • 2. Objectives of best practices To develop secure software. Ensure robust security requirements are implemented in the software development lifecycle. Enhance the overall security of the organization. Mitigate against software-propagated security attacks. Therefore, it is important that drastic measures be instituted in the software development lifecycle with all security requirements and processes being widely considered. In order to ensure that applications are designed and implemented with appropriate security requirements, the best coding practices must be used in addition to ensuring that focus on the security threats is determined and influenced by the integrated day-to- day operations and processes of the software. It is imperative to ensure that the programs that company will develop in future follow the secure coding guidelines regardless of the device or model utilized for programming. 3 Purpose Provide a robust software development lifecycle guide. Institute best secure coding practices that will enable building of secure software at first rather than implementing latter corrective measures. Limit regular or daily basis security monitoring processes. Consequently, it is vital that extreme methods be established in the software development lifecycle with all security requirements and processes being widely considered. Note that it is less expensive to build secure software than to correct security issues after a breach the release and patch cycle of software security management amounts to lengthy security processes and regular security monitoring as well as increase in
  • 3. attack surface. In addition, the objectives and purpose of the company’s best secure coding practices include implementing secure software products, enhancing security level, and creating a reputable brand within the company as well as externally. 4 Resources OWASP Secure Coding Practices Quick Reference Guide. Use cases. Security training and workshops. The resources that can be used as “reference material” and act as a beginner’s guideline for new employees include OWASP Secure Coding Practices Quick Reference Guide, use cases, and security training and workshops. OWASP secure coding practices is an informative guide that includes a checklist of comprehensive coding practices while use case illustrate past incidents and it is enable one to examine a real world case. On the other hand, security training and workshops enable employees to put their theoretical knowledge into practice. 5 Methodology Threat modeling. Input validation Output encoding. Defense in depth. Security and quality assurance. There are various methodology of implementing secure coding practices such as threat modeling, input validation, output encoding, defense in depth, and quality assurance.
  • 4. For instance, threat modeling is the method of the secure software development life cycle will best serve the team because it pertains to understanding the underlying software technology in terms of security requirements, threats and capability, and means to mitigate including emerging bugs. 6 Conclusion Security attacks are nowadays focusing on productivity enhanced software. Some vulnerability exist due to human error when coding. Ensure robust security requirements are implemented in the software development lifecycle in order to mitigate against software-propagated security attacks. In most cases, ineffectively built software result from avoidable circumstances such as human error or use of relatively low standards of development. This means that human errors are likely to allow vulnerabilities to exist in a system and which can be used by attackers to break in to the system using cross- script attacks. 7 References Hall, G. M. L. (2017). Adaptive code: Agile coding with design patterns and SOLID principles. Hudgens, J. (2017). Skill Up: A Software Developer's Guide to Life and Career. Packt Publishing. Campbell, J. (2017). Clean Coding Techniques: Teamwork and Clean Coding. Rother, K. (2017). Pro Python best practices: Debugging, testing and maintenance.
  • 5. -Thank You- 8 Q 8 A stock pays an annual dividend of $2.50 and that dividend is not expected to change. Similar stocks pay a return of 10%. What is P0? (Show workings) Q9 A stock has just paid a dividend and has declared an annual dividend of $3.00 to be paid one year from today. The dividend is expected to grow at a 5% annual rate. The return on equity for similar stocks is 14%. What is P0? (Show workings) Q10 What is β and why is it important to investors and issuers of stock? Describe the behavior of stocks with βs of greater than one, less than one, and less than zero. Q11 A company has 30 million shares outstanding trading for $8 per share. It also has $90 million in outstanding debt. If its equity cost of capital is 15%, and its debt cost of capital is 9%, and its effective corporate tax rate is 40%, what is its weighted average cost of capital? (Show workings) Q12 What is the difference between capital structure and capital budgeting? Explain and give an example of a capital structure decision and an example of a capital budgeting decision. Q13
  • 6. (TCO E) A company has the opportunity to do any of the projects for which the net cash flows per year are shown below. The company has a cost of capital of 15%. Which should the company do and why? You must use at least two capital budgeting methods. Show your work. Year A B C 0 -300 -100 -300 1 100 50 100 2 100 100 100 3 100 100 100 4 100 100 100 5 100 100 100 6 100 100