Sample Essay on:
Developing Secure Code

Here is the synopsis of our sample research paper on Developing Secure Code. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 8 page paper considers the importance and methods that can be adopted when undertaking secure coding. The paper outlines which the need for secure coding is so important and then uses Java as an example to show how careful planning may reduce the weak links in any coding exercise. The bibliography cites 6 sources.

Page Count:

8 pages (~225 words per page)

File: TS14_TEseccode.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

many threats, presented in a variety of forms. Whilst viruses are well published, hackers are a hidden threat. Hackers create both security and commercial threats, looking for valuable information though back doors. Hackers can also slow down network traffic increasing networking costs (Howard and LeBlanc, 2001). John Pescatore has said "Secure software has long been considered an oxymoron, since most developers try to sprinkle security on top of their software products rather than baking it in" (quoted in Howard and LeBlanc, 2001). With the current senario where the presence of hackers present a range of threats, secure coding may reduce or mitigate some of the risks saving companies thousands of dollars a year. It is known that Hackers cost millions of dollars every year, in the Computer Security Institute survey published in 2003 it was shown that the losses of 251 organisations in the United States losses amounted to $202 million (Richardson, 2003). This is an improvement on the previous years survey of 56% (Richardson, 2003). This indicates some improvement, but losses are still high and many of the savings have been balanced by increased costs of security. To consider these risks once they are identified in an application is too late; the solution needs to be in the beginning stages with developers using secure coding to protect software form security breaches. The design stages can include the considerations required to develop secure code, this will reduce the level of vulnerability of a finished application. Despite this need for careful consideration, the implementation of secure code is not necessarily overly complex. Approaches to Risk However coding is undertaken there will never be anything that is 100% secure. If the student wants ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now