A Technical Support to Enrich Existing Software Development Courses, with the Additional Topic of Secure Coding

2021 ◽  
Author(s):  
Christian Kaufmann ◽  
Harald Wahl
2021 ◽  
Vol 2083 (3) ◽  
pp. 032095
Author(s):  
Zhimin Ni ◽  
Fan Zhao

Abstract For the existing service-oriented software single, favors business processing, cannot guarantee the software business processing into the development of software. When the operator encounters operational problems, software failure problems and other problems related to software operation and operation, software development technicians to provide technical support to ensure the software’s business processing functions. This study will move away from dependence on other software and provide technical support to business software operators accurately and in a timely manner to effectively solve the problems that operators may encounter.


2014 ◽  
Vol 536-537 ◽  
pp. 776-781
Author(s):  
Chen Xu ◽  
Ling Long Kong

Based on the development of ship borne Automatic Identification System (AIS) and the expansion of AIS application in maritime management, in this paper, we expound AIS Development in recent years, summarize the additional content of Recommendation ITU-R M.1371-4, analyze the format of AIS message, realize the decoding of AIS message in software development environment and store the dynamic information and static information of the ship to the database, thus provide technical support in marine monitoring system.


2011 ◽  
Vol 141 ◽  
pp. 498-502
Author(s):  
Da Yong Jiang ◽  
Jin Zhou Lin

In order to find the machine fault and take adaptive measures to deal with it accurately and in time for machine equipment fault diagnosis, a portable data-acquisition and signal analysis instrument based on Qt is introduced, which plays an important role in mechanical industry. Qt is a tool which is used to build multi-platform graphical interface in the way of "written once, compiled anywhere”. The factors which make Qt outstanding in most programming tools are the availability of source code, help documentation and high-class technical support and so on. In this paper, how to develop the software of portable data-acquisition and signal analysis instrument is discussed in detail.


2021 ◽  
Author(s):  
Fitzroy Nembhard ◽  
Marco M. Carvalho

The area of software development and secure coding can benefit significantly from advancements in virtual assistants. Research has shown that many coders neglect security in favor of meeting deadlines. This shortcoming leaves systems vulnerable to attackers. While a plethora of tools are available for programmers to scan their code for vulnerabilities, finding the right tool can be challenging. It is therefore imperative to adopt measures to get programmers to utilize code analysis tools that will help them produce more secure code. This chapter looks at the limitations of existing approaches to secure coding and proposes a methodology that allows programmers to scan and fix vulnerabilities in program code by communicating with virtual assistants on their smart devices. With the ubiquitous move towards virtual assistants, it is important to design systems that are more reliant on voice than on standard point-and-click and keyboard-driven approaches. Consequently, we propose MyCodeAnalyzer, a Google Assistant app and code analysis framework, which was designed to interactively scan program code for vulnerabilities and flaws using voice commands during development. We describe the proposed methodology, implement a prototype, test it on a vulnerable project and present our results.


2021 ◽  
Vol 4 (1) ◽  
pp. 13-17
Author(s):  
Rahmawati N

Proses pengembangan perangkat lunak harus mengikuti tahapan tertentu yang disebut dengan Software Development Life Cycle atau (SDLC). Pada pengembangan perangkat lunak, yang belum nampak secara eksplisit pada SDLC adalah aspek keamanan. Keamanan seharusnya hadir pada setiap tahapan SDLC. Keamanan perangkat lunak bisa dimulai dari security requirement, secure design, secure coding, hingga pengujian. Tahapan coding merupakakan implementasi dari desain dalam bentuk kode. Programmer harus berhati-hati agar tidak ada lubang keamanan pada saat perangkat lunak dikembangkan. Membuat perangkat lunak yang aman dengan desain memerlukan pertimbangan pada bagiamana cara menangani kesalahan, terutama pada tahapan coding. Bahasa pemrograman Java yang memiliki sifat  mengurangi kemungkinan terjadinya kesalahan tipe data. Bahasa termasuk ke dalam pemrograman berorientasi objek. Pemrograman berorientasi objek merupakan teknik membuat suatu program berdasarkan objek dan hal yang bisa dilakukan oleh objek tersebut. Bahasa Java menyediakan fitur penanganan pengecualian, seperti pernyataan throw dan blok try-catch-finally.  Pada bahasa ini terdapat exception handling yaitu mekanisme penangan error yang mungkin terjadi dalam suatu program


Author(s):  
Anchitaalagammai J. V. ◽  
Kavitha Samayadurai ◽  
Murali S. ◽  
Padmadevi S. ◽  
Shantha Lakshmi Revathy J.

Internet of things (IoT) describes an emerging trend where a large number of embedded devices (things) are connected to the internet to participate in automating activities that create compounded value for the end consumers as well as for the enterprises. One of the greatest concerns in IoT is security, and how software engineers address it will play a deeper role. As devices interact with each other, businesses need to be able to securely handle the data deluge. With focused approach, it is possible to minimize the vulnerabilities and risks exposed to the devices and networks. Adopting security-induced software development lifecycle (SDL) is one of the major steps in identifying and minimizing the zero-day vulnerabilities and hence to secure the IoT applications and devices. This chapter focuses best practices for adopting security into the software development process with the help of two approaches: cryptographic and machine learning techniques to integrate secure coding and security testing ingrained as part of software development lifecycle.


2021 ◽  
Author(s):  
Zhongwei Teng ◽  
Jacob Tate ◽  
William Nock ◽  
Carlos Olea ◽  
Jules White

Checklists have been used to increase safety in aviation and help prevent mistakes in surgeries. However, despite the success of checklists in many domains, checklists have not been universally successful in improving safety. A large volume of checklists is being published online for helping software developers produce more secure code and avoid mistakes that lead to cyber-security vulnerabilities. It is not clear if these secure development checklists are an effective method of teaching developers to avoid cyber-security mistakes and reducing coding errors that introduce vulnerabilities. This paper presents in-process research looking at the secure coding checklists available online, how they map to well-known checklist formats investigated in prior human factors research, and unique pitfalls that some secure development checklists exhibit related to decidability, abstraction, and reuse.


Sign in / Sign up

Export Citation Format

Share Document