
Vandana Sharma,
- Leading Technology Organization, San Francisco Bay Area, California, USA
Abstract document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_abs_109933’);});Edit Abstract & Keyword
In today’s rapidly evolving digital landscape, coding professionals serve as the architects shaping our technological future. Whether they are web developers, software engineers, cybersecurity specialists, or data analysts, these experts are responsible for building, designing, and securing the digital frameworks that power modern society. Their work ensures that systems function seamlessly, and vast amounts of data are kept safe. However, the growing dependence on technology and digital infrastructure has attracted the attention of cybercriminals. These malevolent entities, ranging from individual rogue hackers to organized nation-state attackers, continuously seek vulnerabilities in the very systems coding professionals meticulously create. As their roles become increasingly pivotal, developers and engineers face a growing range of cybersecurity threats. These threats can disrupt software integrity, expose sensitive data, and inflict significant financial or reputational damage. Given the persistent and evolving nature of these threats, it is crucial for coding professionals to adopt robust, proactive strategies to safeguard both personal and client information. By staying vigilant and up to date with the latest security practices, coding experts can mitigate risks and ensure that the foundations they build remain resilient against an array of cyber threats. This proactive stance enables them to maintain the integrity of our digital world, ensuring it remains a safe and functional environment.
Keywords: Cybersecurity for developers, Data breaches, Software development security, Secure coding practices, Cyber threats, SDLC security, Cyber-attacks, Data protection, Encryption, Access control, Software vulnerabilities, Secure software development, Developer security practices, Cybersecurity strategies, Digital infrastructure security
[This article belongs to International Journal of Information Security Engineering (ijise)]
Vandana Sharma. Dodging Data Breaches: Cybersecurity for Developers. International Journal of Information Security Engineering. 2024; 02(02):-.
Vandana Sharma. Dodging Data Breaches: Cybersecurity for Developers. International Journal of Information Security Engineering. 2024; 02(02):-. Available from: https://journals.stmjournals.com/ijise/article=2024/view=0
References
document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_ref_109933’);});Edit
1. OWASP Top Ten | OWASP Foundation. Owasp.org. 2024. Available from: https://owasp.org/www-project-top-ten/ 2. Cybersecurity | NIST. NIST. 2016. Cybersecurity Framework. National Institute of Standards and Technology (NIST) https://www.nist.gov/cybersecurity 3. Secure Software Development and Code Analysis Tools | SANS Institute. Sans.org. 2024. Available from: https://www.sans.org/white-papers/389/ 4. Ponemon Institute. (2023). Cost of a Data Breach Report 2023. IBM Security. ibm.com https://www.ibm.com/reports/data-breach 5. Center for Internet Security. (2023). CIS Controls v8. https://www.cisecurity.org/controls/v8 6. Google Cloud. Zero Trust Security for Cloud Workloads. https://cloud.google.com/learn/what-is-zero-trust 7. Microsoft. (2022). Best Practices for Access Control and Identity Management. https://learn.microsoft.com/en-us/security/zero-trust/develop/identity-iam-development-best-practices 8. CISCO. (2023). The Importance of Encryption in Cybersecurity. Cisco Secure. https://www.cisco.com/c/en/us/products/security/encryption-explained.html#:~:text=Encryption%20provides%20a%20layer%20of,integrity%20of%20data%2C%20and%20authentication. 9. Gartner. (2023). Top Cybersecurity Trends in 2023. Gartner Research. https://www.gartner.com/en/cybersecurity/topics/cybersecurity-trends 10. Verizon. (2023). Data Breach Investigations Report (DBIR) 2023. https://www.verizon.com/business/resources/reports/dbir/ 11. ISACA. (2023). Cybersecurity Governance Best Practices. ISACA. https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2023/how-cybersecurity-best-practices-are-evolving-to-manage-ongoing-threats 12. National Cyber Security Centre (NCSC). (2022). Guidance on Secure Software Development. https://www.ncsc.gov.uk/collection/developers-collection 13. Cloud Security Alliance. (2023). Best Practices for Cloud Security. https://cloudsecurityalliance.org/blog/2022/04/23/cloud-security-best-practices-from-the-cloud-security-alliance 14. Palo Alto Networks. (2023). Protecting Software Development Environments from Cyber Threats. paloaltonetworks.com. 15. Jarunde, N. (2024). The Future of the Finance Workforce: How Microsoft Copilot May Reshape Roles and Skillsets. International Journal of Finance, 9(3), 32-41. https://doi.org/10.47941/ijf.1918 16. IBM Study on security measures. ( 2024) https://acsense.com/blog/ibm-2024-cost-of-data-breach- report/#:~:text=The%202024%20IBM%20Data%20Breach%20Report%20reveals%20that%20organizations%20deploying,contract%20the%20overall%20breach%20lifecycle. 17. Cybersecurity Ventures (2023). https://cybersecurityventures.com/wp-content/uploads/2023/04/Security-Awareness-Training-Report-2023-1.pdf 18. Ponemon Research (2021). https://www.ponemon.org/research/ponemon-library/security/the-economic-value-of-prevention-in-the-cybersecurity-lifecycle.html
| Volume | 02 |
| Issue | 02 |
| Received | 15/09/2024 |
| Accepted | 03/10/2024 |
| Published | 28/10/2024 |
function myFunction2() {
var x = document.getElementById(“browsefigure”);
if (x.style.display === “block”) {
x.style.display = “none”;
}
else { x.style.display = “Block”; }
}
document.querySelector(“.prevBtn”).addEventListener(“click”, () => {
changeSlides(-1);
});
document.querySelector(“.nextBtn”).addEventListener(“click”, () => {
changeSlides(1);
});
var slideIndex = 1;
showSlides(slideIndex);
function changeSlides(n) {
showSlides((slideIndex += n));
}
function currentSlide(n) {
showSlides((slideIndex = n));
}
function showSlides(n) {
var i;
var slides = document.getElementsByClassName(“Slide”);
var dots = document.getElementsByClassName(“Navdot”);
if (n > slides.length) { slideIndex = 1; }
if (n (item.style.display = “none”));
Array.from(dots).forEach(
item => (item.className = item.className.replace(” selected”, “”))
);
slides[slideIndex – 1].style.display = “block”;
dots[slideIndex – 1].className += ” selected”;
}
