{"id":217,"date":"2024-03-20T09:54:06","date_gmt":"2024-03-20T13:54:06","guid":{"rendered":"https:\/\/home.hamptonu.edu\/iac\/?page_id=217"},"modified":"2024-03-20T10:32:44","modified_gmt":"2024-03-20T14:32:44","slug":"secure-coding-secure-software-engineering","status":"publish","type":"page","link":"https:\/\/home.hamptonu.edu\/iac\/secure-coding-secure-software-engineering\/","title":{"rendered":"Secure Coding \/ Secure Software Engineering"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"217\" class=\"elementor elementor-217\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34ba219 e-flex e-con-boxed e-con e-parent\" data-id=\"34ba219\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3bdf4 elementor-widget elementor-widget-text-editor\" data-id=\"2e3bdf4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 class=\"pagetitle\">Secure Coding \/ Secure Software Engineering<\/h1><p>\u00a0<\/p><h3>Secure Coding<\/h3><ul><li><strong>CERT Secure Coding Standards<\/strong> (<a href=\"https:\/\/web.archive.org\/web\/20210620125838\/https:\/\/www.securecoding.cert.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.securecoding.cert.org\/<\/a>)\u00a0This site supports the development of coding standards for commonly used programming languages such as C, C++, Java, and Perl, and the Android<sup>TM<\/sup>\u00a0platform. These standards are developed through a broad-based community effort by members of the software development and software security communities.<\/li><li><strong>Oracle Secure Coding Stands<\/strong> (<a href=\"https:\/\/web.archive.org\/web\/20210620125838\/https:\/\/www.oracle.com\/support\/assurance\/development\/secure-coding-standards.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.oracle.com\/support\/assurance\/development\/secure-coding-standards.html<\/a>) To ensure that Oracle products are developed with consistently high security assurance, and that developers avoid common insecure coding practices, Oracle employs formal secure coding standards. Oracle Secure Coding Standards are a roadmap and guide for developers in their efforts to produce secure code. They discuss general security knowledge areas such as design principles, common vulnerabilities, etc. and provide specific guidance on topics such as data validation, data privacy, CGI, user management, and more.<\/li><li><strong>Secure Coding Guide for iOS Developer<\/strong>(<a href=\"https:\/\/web.archive.org\/web\/20210620125838\/https:\/\/developer.apple.com\/library\/mac\/documentation\/Security\/Conceptual\/SecureCodingGuide\/Introduction.html\" target=\"_blank\" rel=\"noopener\">https:\/\/developer.apple.com\/library\/mac\/documentation\/Security\/Conceptual\/SecureCodingGuide\/Introduction.html<\/a>) Secure coding is the practice of writing programs that are resistant to attack by malicious or mischievous people or programs. Secure coding helps protect a user\u2019s data from theft or corruption. In addition, an insecure program can provide access for an attacker to take control of a server or a user\u2019s computer, resulting in anything from a denial of service to a single user to the compromise of secrets, loss of service, or damage to the systems of thousands of users. Secure coding is important for all software; if you write any code that runs on Macintosh computers or on iOS devices, from scripts for your own use to commercial software applications, you should be familiar with the information in this document.<\/li><li><strong>Microsoft Secure Coding Guidelines .NET Framework<\/strong> (<a href=\"https:\/\/web.archive.org\/web\/20210620125838\/https:\/\/msdn.microsoft.com\/en-us\/library\/d55zzx87(v=vs.90).aspx\" target=\"_blank\" rel=\"noopener\">https:\/\/msdn.microsoft.com\/en-us\/library\/d55zzx87(v=vs.90).aspx<\/a>)\u00a0Evidence-based security policy and code access security provide very powerful, explicit mechanisms to implement security. Most application code can simply use the infrastructure implemented by the .NET Framework. In some cases, additional application-specific security is required, built either by extending the security system or by using new ad hoc methods.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Secure Coding \/ Secure Software Engineering \u00a0 Secure Coding CERT Secure Coding Standards (https:\/\/www.securecoding.cert.org\/)\u00a0This site supports the development of coding standards for commonly used programming languages such as C, C++, Java, and Perl, and the AndroidTM\u00a0platform. These standards are developed through a broad-based community effort by members of the software development and software security communities. [&hellip;]<\/p>\n","protected":false},"author":147,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-217","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure Coding \/ Secure Software Engineering - Information Assurance Center<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Coding \/ Secure Software Engineering - Information Assurance Center\" \/>\n<meta property=\"og:description\" content=\"Secure Coding \/ Secure Software Engineering \u00a0 Secure Coding CERT Secure Coding Standards (https:\/\/www.securecoding.cert.org\/)\u00a0This site supports the development of coding standards for commonly used programming languages such as C, C++, Java, and Perl, and the AndroidTM\u00a0platform. These standards are developed through a broad-based community effort by members of the software development and software security communities. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/home.hamptonu.edu\/iac\/secure-coding-secure-software-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Assurance Center\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-20T14:32:44+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/secure-coding-secure-software-engineering\\\/\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/secure-coding-secure-software-engineering\\\/\",\"name\":\"Secure Coding \\\/ Secure Software Engineering - Information Assurance Center\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#website\"},\"datePublished\":\"2024-03-20T13:54:06+00:00\",\"dateModified\":\"2024-03-20T14:32:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/secure-coding-secure-software-engineering\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/secure-coding-secure-software-engineering\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/secure-coding-secure-software-engineering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Coding \\\/ Secure Software Engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#website\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/\",\"name\":\"Information Assurance Center\",\"description\":\"At the HU School of Science\",\"publisher\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#organization\",\"name\":\"Information Assurance Center\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/wp-content\\\/uploads\\\/sites\\\/105\\\/2026\\\/03\\\/HU_logo_white_227x113.png\",\"contentUrl\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/wp-content\\\/uploads\\\/sites\\\/105\\\/2026\\\/03\\\/HU_logo_white_227x113.png\",\"width\":227,\"height\":113,\"caption\":\"Information Assurance Center\"},\"image\":{\"@id\":\"https:\\\/\\\/home.hamptonu.edu\\\/iac\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Coding \/ Secure Software Engineering - Information Assurance Center","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Secure Coding \/ Secure Software Engineering - Information Assurance Center","og_description":"Secure Coding \/ Secure Software Engineering \u00a0 Secure Coding CERT Secure Coding Standards (https:\/\/www.securecoding.cert.org\/)\u00a0This site supports the development of coding standards for commonly used programming languages such as C, C++, Java, and Perl, and the AndroidTM\u00a0platform. These standards are developed through a broad-based community effort by members of the software development and software security communities. [&hellip;]","og_url":"https:\/\/home.hamptonu.edu\/iac\/secure-coding-secure-software-engineering\/","og_site_name":"Information Assurance Center","article_modified_time":"2024-03-20T14:32:44+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/home.hamptonu.edu\/iac\/secure-coding-secure-software-engineering\/","url":"https:\/\/home.hamptonu.edu\/iac\/secure-coding-secure-software-engineering\/","name":"Secure Coding \/ Secure Software Engineering - Information Assurance Center","isPartOf":{"@id":"https:\/\/home.hamptonu.edu\/iac\/#website"},"datePublished":"2024-03-20T13:54:06+00:00","dateModified":"2024-03-20T14:32:44+00:00","breadcrumb":{"@id":"https:\/\/home.hamptonu.edu\/iac\/secure-coding-secure-software-engineering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/home.hamptonu.edu\/iac\/secure-coding-secure-software-engineering\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/home.hamptonu.edu\/iac\/secure-coding-secure-software-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/home.hamptonu.edu\/iac\/"},{"@type":"ListItem","position":2,"name":"Secure Coding \/ Secure Software Engineering"}]},{"@type":"WebSite","@id":"https:\/\/home.hamptonu.edu\/iac\/#website","url":"https:\/\/home.hamptonu.edu\/iac\/","name":"Information Assurance Center","description":"At the HU School of Science","publisher":{"@id":"https:\/\/home.hamptonu.edu\/iac\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/home.hamptonu.edu\/iac\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/home.hamptonu.edu\/iac\/#organization","name":"Information Assurance Center","url":"https:\/\/home.hamptonu.edu\/iac\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/home.hamptonu.edu\/iac\/#\/schema\/logo\/image\/","url":"https:\/\/home.hamptonu.edu\/iac\/wp-content\/uploads\/sites\/105\/2026\/03\/HU_logo_white_227x113.png","contentUrl":"https:\/\/home.hamptonu.edu\/iac\/wp-content\/uploads\/sites\/105\/2026\/03\/HU_logo_white_227x113.png","width":227,"height":113,"caption":"Information Assurance Center"},"image":{"@id":"https:\/\/home.hamptonu.edu\/iac\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages\/217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/users\/147"}],"replies":[{"embeddable":true,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/comments?post=217"}],"version-history":[{"count":5,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages\/217\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/pages\/217\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/home.hamptonu.edu\/iac\/wp-json\/wp\/v2\/media?parent=217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}