Assginment Programming Techniques
Assginment Programming Techniques
Input Validation. Seacord defines Input validation as “the proper testing of any input
supplied by a user or application.” He went on to emphasize that "Proper input validation
can eliminate the vast majority of software vulnerabilities.”
Keep it Simple. Saltzer highlighted that “Keep the design as simple and small as
possible.” He went on to emphasize that “Complex designs increase the likelihood that
errors will be made in their implementation, configuration and use. Additionally the
effort required to achieve an appropriate level of assurance increases dramatically as
security mechanisms become more complex”
Threat Modelling. Swidershi & Snyder defined threat modelling as “the approach of
playing through attacks and hacks ahead of time.” They went on to emphasize that
“Threat modelling involves identifying key assets, decomposing the application,
identifying and categorizing the threats to each asset or component, rating the threats
based on a risk ranking anfd then developing threat mitigating strategies that are
implemented in designs, code and test cases.”
Reference List
Conesa, Patrick, Community Safety Guide: Security Planning for Everyone, 2018
Albert Caballero, Managing Information Security, 2014
Robert Seacord, Secure Coding Practices, 2006
J H Saltzer, Protection & the Control of Information Sharing in Multics, 1974,
F Swidershi, W Snyder, Threat Modelling,2004, WA: Microsoft Press