Dodging Data Breaches: Cybersecurity for Developers

Year : 2024 | Volume :02 | Issue : 02 | Page : –
By
vector

Vandana Sharma,

  1. Leading Technology Organization, San Francisco Bay Area, California, USA

Abstract document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_abs_109933’);});Edit Abstract & Keyword

In today’s rapidly evolving digital landscape, coding professionals serve as the architects shaping our technological future. Whether they are web developers, software engineers, cybersecurity specialists, or data analysts, these experts are responsible for building, designing, and securing the digital frameworks that power modern society. Their work ensures that systems function seamlessly, and vast amounts of data are kept safe. However, the growing dependence on technology and digital infrastructure has attracted the attention of cybercriminals. These malevolent entities, ranging from individual rogue hackers to organized nation-state attackers, continuously seek vulnerabilities in the very systems coding professionals meticulously create. As their roles become increasingly pivotal, developers and engineers face a growing range of cybersecurity threats. These threats can disrupt software integrity, expose sensitive data, and inflict significant financial or reputational damage. Given the persistent and evolving nature of these threats, it is crucial for coding professionals to adopt robust, proactive strategies to safeguard both personal and client information. By staying vigilant and up to date with the latest security practices, coding experts can mitigate risks and ensure that the foundations they build remain resilient against an array of cyber threats. This proactive stance enables them to maintain the integrity of our digital world, ensuring it remains a safe and functional environment.

Keywords: Cybersecurity for developers, Data breaches, Software development security, Secure coding practices, Cyber threats, SDLC security, Cyber-attacks, Data protection, Encryption, Access control, Software vulnerabilities, Secure software development, Developer security practices, Cybersecurity strategies, Digital infrastructure security

[This article belongs to International Journal of Information Security Engineering (ijise)]

How to cite this article:
Vandana Sharma. Dodging Data Breaches: Cybersecurity for Developers. International Journal of Information Security Engineering. 2024; 02(02):-.
How to cite this URL:
Vandana Sharma. Dodging Data Breaches: Cybersecurity for Developers. International Journal of Information Security Engineering. 2024; 02(02):-. Available from: https://journals.stmjournals.com/ijise/article=2024/view=0

Full Text PDF

References
document.addEventListener(‘DOMContentLoaded’,function(){frmFrontForm.scrollToID(‘frm_container_ref_109933’);});Edit

1. OWASP Top Ten | OWASP Foundation. Owasp.org. 2024. Available from: https://owasp.org/www-project-top-ten/ 2. Cybersecurity | NIST. NIST. 2016. Cybersecurity Framework. National Institute of Standards and Technology (NIST) https://www.nist.gov/cybersecurity 3. Secure Software Development and Code Analysis Tools | SANS Institute. Sans.org. 2024. Available from: https://www.sans.org/white-papers/389/ 4. Ponemon Institute. (2023). Cost of a Data Breach Report 2023. IBM Security. ibm.com https://www.ibm.com/reports/data-breach 5. Center for Internet Security. (2023). CIS Controls v8. https://www.cisecurity.org/controls/v8 6. Google Cloud. Zero Trust Security for Cloud Workloads. https://cloud.google.com/learn/what-is-zero-trust 7. Microsoft. (2022). Best Practices for Access Control and Identity Management. https://learn.microsoft.com/en-us/security/zero-trust/develop/identity-iam-development-best-practices 8. CISCO. (2023). The Importance of Encryption in Cybersecurity. Cisco Secure. https://www.cisco.com/c/en/us/products/security/encryption-explained.html#:~:text=Encryption%20provides%20a%20layer%20of,integrity%20of%20data%2C%20and%20authentication. 9. Gartner. (2023). Top Cybersecurity Trends in 2023. Gartner Research. https://www.gartner.com/en/cybersecurity/topics/cybersecurity-trends 10. Verizon. (2023). Data Breach Investigations Report (DBIR) 2023. https://www.verizon.com/business/resources/reports/dbir/ 11. ISACA. (2023). Cybersecurity Governance Best Practices. ISACA. https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2023/how-cybersecurity-best-practices-are-evolving-to-manage-ongoing-threats 12. National Cyber Security Centre (NCSC). (2022). Guidance on Secure Software Development. https://www.ncsc.gov.uk/collection/developers-collection 13. Cloud Security Alliance. (2023). Best Practices for Cloud Security. https://cloudsecurityalliance.org/blog/2022/04/23/cloud-security-best-practices-from-the-cloud-security-alliance 14. Palo Alto Networks. (2023). Protecting Software Development Environments from Cyber Threats. paloaltonetworks.com. 15. Jarunde, N. (2024). The Future of the Finance Workforce: How Microsoft Copilot May Reshape Roles and Skillsets. International Journal of Finance, 9(3), 32-41. https://doi.org/10.47941/ijf.1918 16. IBM Study on security measures. ( 2024) https://acsense.com/blog/ibm-2024-cost-of-data-breach- report/#:~:text=The%202024%20IBM%20Data%20Breach%20Report%20reveals%20that%20organizations%20deploying,contract%20the%20overall%20breach%20lifecycle. 17. Cybersecurity Ventures (2023). https://cybersecurityventures.com/wp-content/uploads/2023/04/Security-Awareness-Training-Report-2023-1.pdf 18. Ponemon Research (2021). https://www.ponemon.org/research/ponemon-library/security/the-economic-value-of-prevention-in-the-cybersecurity-lifecycle.html


Regular Issue Subscription Review Article
Volume 02
Issue 02
Received 15/09/2024
Accepted 03/10/2024
Published 28/10/2024

function myFunction2() {
var x = document.getElementById(“browsefigure”);
if (x.style.display === “block”) {
x.style.display = “none”;
}
else { x.style.display = “Block”; }
}
document.querySelector(“.prevBtn”).addEventListener(“click”, () => {
changeSlides(-1);
});
document.querySelector(“.nextBtn”).addEventListener(“click”, () => {
changeSlides(1);
});
var slideIndex = 1;
showSlides(slideIndex);
function changeSlides(n) {
showSlides((slideIndex += n));
}
function currentSlide(n) {
showSlides((slideIndex = n));
}
function showSlides(n) {
var i;
var slides = document.getElementsByClassName(“Slide”);
var dots = document.getElementsByClassName(“Navdot”);
if (n > slides.length) { slideIndex = 1; }
if (n (item.style.display = “none”));
Array.from(dots).forEach(
item => (item.className = item.className.replace(” selected”, “”))
);
slides[slideIndex – 1].style.display = “block”;
dots[slideIndex – 1].className += ” selected”;
}