0% found this document useful (0 votes)
2 views11 pages

MIKIIIIIIIIIII

The research proposal from Ambo University focuses on improving secure coding practices in Java to protect against hacking. It aims to assess Java developers' knowledge of security, identify common mistakes, and enhance training methods. The study will utilize surveys and interviews to gather data and ultimately contribute to safer software development and cybersecurity research.

Uploaded by

abrehamasfewu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views11 pages

MIKIIIIIIIIIII

The research proposal from Ambo University focuses on improving secure coding practices in Java to protect against hacking. It aims to assess Java developers' knowledge of security, identify common mistakes, and enhance training methods. The study will utilize surveys and interviews to gather data and ultimately contribute to safer software development and cybersecurity research.

Uploaded by

abrehamasfewu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Research Proposal

Ambo University

School of Informatics and Electrical


Engineering

Department of Information Technology

◦TITLE: Secure Coding Practices in Java


Outline
 Introduction

 Statement of the Problem

 Purpose of the Study

 Literature Review

 Methods and Procedures

 Data Collection Instruments

 Significance of the Study

 Conclusion
Introduction

Software security is very important today because many people use


software for business and daily life.

Java is a popular programming language used for websites, mobile


apps, and big company systems.

However, many Java programs have security problems because


developers do not always follow safe coding rules.

This study wants to teach Java developers how to write safer code to
protect against hackers.
Statement of the Problem
◦Java programs are often attacked by hackers because they have
weaknesses.

◦Many developers do not know enough about security or are not


trained properly.

◦Companies sometimes rush to finish projects fast and forget about


security.

◦Because of these problems, data can be stolen, companies lose


money, and their good name can be damaged.
Purpose of the Study

Find out how much Java developers know about writing secure
code.

Identify the most common mistakes and security problems in


Java programs.

Check if the current security training for developers is good


enough.

Create easy-to-follow rules and advice to help developers write


safer Java programs.
Literature Review
◦Big companies like Microsoft created models like the Security
Development Lifecycle (SDL) to teach safe coding.

◦OWASP Top Ten is a list of the most dangerous security risks in


web applications.

◦Studies show that developers often know about these risks but
do not always use safe practices.

◦Training is available but sometimes not practical enough for


real-world use.
Methods and Procedures

◦This study will use both surveys and interviews to collect


information from Java developers.

◦Developers will be chosen from universities, companies, and


open-source communities to get a variety of views.

◦Surveys will have multiple-choice and open-ended questions to


find out what developers know.

◦Interviews will go deeper into the experiences and challenges


developers face when trying to write secure code.
Data Collection Instruments

Online Surveys: Simple forms that developers can fill out to


test their knowledge about secure coding.

Interviews: Personal talks with developers to understand their


real-life problems and ideas about improving security.
Significance of the Study

This study will help developers understand the importance of


writing secure code.

It will help improve the way developers are trained about
security.

Companies will benefit by having safer applications that are


harder for hackers to attack.

The study will also add to research in the cybersecurity and


software development fields.
Conclusion

 Java developers need better training and tools to write secure code.

 This study suggests easy steps developers can follow to make their
programs safer.

 Continuous learning and security checks should be part of every


development process.

 By improving secure coding habits, we can protect important data


and make software safer for everyone.
Thank You

You might also like