Code Security: Continuous Analysis and Practice for Developers

Title: Code Security: Continuous Analysis and Practice for Developers
Permalink: code-security-continuous-analysis-practice-developers
Description: This research explores the importance of secure coding practices in mitigating vulnerabilities like SQL injection and XSS, emphasizing proactive security strategies for developers.
Focus Keywords: Secure Coding, Cybersecurity, Vulnerabilities, high-impact factor journal, journal with a DOI

International Journal of Engineering and Techniques – Volume 10 Issue 2, March 2024

Halina Patel1, Kusum Lata Dhiman2
1Computer Science and Engineering, Parul Institute of Technology, Vadodara. Email: halinapatel23@gmail.com
2Computer Science and Engineering, Parul Institute of Technology, Vadodara. Email: kusumlata.dhiman21133@paruluniversity.ac.in

Abstract

In the realm of cybersecurity, software vulnerabilities persist as a significant threat, prompting the imperative for robust secure coding practices. This paper explores the role of secure coding in bolstering software security by examining prevalent vulnerabilities like SQL injection and Cross-Site Scripting (XSS). It advocates for best practices such as input validation, authentication, and access control to fortify applications against potential threats. The paper highlights key challenges, including disconnected security needs and insufficient developer training, and presents a methodology to promote security awareness and effective implementation.

Keywords

Secure Coding, Cybersecurity, Software Vulnerabilities, SQL Injection, XSS, Threat Mitigation

How to Cite

Halina Patel, Kusum Lata Dhiman, “Code Security: Continuous Analysis and Practice for Developers,” International Journal of Engineering and Techniques, Volume 10, Issue 2, March 2024.

Submit your research article: editorijetjournal@gmail.com
Tags: High-impact factor journal, UGC-approved journal, DOI publication, peer-reviewed journal, cybersecurity research, engineering publication, application security best practices.

Post Comment