Secure Coding Practises for Enhancing the Art of Ethical Hacking: A Comprehensive Study

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : May 2, 2024 at 5:34 pm | [if 1553 equals=””] Volume :02 [else] Volume :02[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Mohammad Samreen, Mohammad Samreen, Manas Kumar Yogi

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Assistant Professor, Computer Science and Engineering Department, Pragati Engineering College (Autonomous), Surampalem, Computer Science and Engineering Department, Pragati Engineering College (Autonomous), Surampalem, Andhra Pradesh, Andhra Pradesh, India, India
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nIn the quickly developing scene of network safety, secure coding and moral hacking are essential for strengthening computerized environments. Secure coding systems and moral hacking are linked to digital strength. This study examines the relationship between secure coding and moral hacking, emphasizing the importance of a hierarchical culture that focuses on secure coding standards. Attention to detail in software development can protect against malicious exploits. Security considerations are integrated throughout the development lifecycle to prevent cyber threats. Expertise in ethical hacking is utilized to uncover code vulnerabilities, highlighting the importance of secure coding practices in risk mitigation within organizations. culture must prioritize secure coding principles and foster collaboration. A combination of defensive and offensive strategies creates a resilient cybersecurity ecosystem. Secure coding practices contribute to the enhancement of ethical hacking. The relationship between secure coding practices and ethical hacking is intertwined with cybersecurity. Secure coding is essential for preventing common vulnerabilities. Threat modeling helps developers design resilient systems. Furthermore, it explores the integration of automated security testing tools, static code analysis, and continuous monitoring to identify vulnerabilities early in the development process, contributing to a more secure codebase. Research examines ethical hacking through penetration testing and red teaming. Ethical hackers can use adversarial knowledge to improve cybersecurity. Secure coding is essential for software resilience. Expanding its purview, the research investigates the application of DevSecOps principles, showcasing how the integration of security measures into the development and operational processes enhances the agility and security posture of software systems. Organizations should focus on security-first mindsets to avoid ethical hacking. Research aims to create a digital landscape that can withstand cyber threats.

n

n

n

Keywords: Authentication, Authorization, Security, Coding, Encryption

n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Wireless Security and Networks(ijwsn)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Wireless Security and Networks(ijwsn)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Mohammad Samreen, Mohammad Samreen, Manas Kumar Yogi.Secure Coding Practises for Enhancing the Art of Ethical Hacking: A Comprehensive Study.International Journal of Wireless Security and Networks.May 2, 2024; 02(01):-.

n

How to cite this URL: Mohammad Samreen, Mohammad Samreen, Manas Kumar Yogi , Secure Coding Practises for Enhancing the Art of Ethical Hacking: A Comprehensive Study ijwsn May 2, 2024 {cited May 2, 2024};02:-. Available from: https://journals.stmjournals.com/ijwsn/article=May 2, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] nn

n[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Meng N, Nagy S, Yao D, Zhuang W, Argoty GA. Secure coding practices in java: Challenges and vulnerabilities. InProceedings of the 40th International Conference on Software Engineering 2018 May 27 (pp. 372-383).
  2. Gupta A, Anand A. Ethical hacking and hacking attacks. Int. J. Eng. Comput. Sci. 2017 Apr 4;6(6):2319-7242.
  3. Maurushat A. Ethical hacking. University of Ottawa Press/Les Presses de l’Université d’Ottawa; 2019.
  4. Baloch, Rafay. Ethical hacking and penetration testing guide. Auerbach Publications, 2017.
  5. Macnish, Kevin, and Jeroen Van der Ham. “Ethics in cybersecurity research and practice.” Technology in society 63 (2020): 101382.
  6. Najera-Gutierrez G, Ansari JA. Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux. Packt Publishing Ltd; 2018 Feb 28.
  7. Liguori P, Al-Hossami E, Orbinato V, Natella R, Shaikh S, Cotroneo D, Cukic B. EVIL: exploiting software via natural language. In2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE) 2021 Oct 25 (pp. 321-332). IEEE.
  8. Raman R, Calyam P, Achuthan K. ChatGPT or Bard: Who is a better Certified Ethical Hacker? Computers & Security. 2024 May 1;140: 103804.
  9. Gupta M, Akiri C, Aryal K, Parker E, Praharaj L. From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy. IEEE Access. 2023 Aug 1.
  10. Cabaj K, Domingos D, Kotulski Z, Respício A. Cybersecurity education: Evolution of the discipline and analysis of master programs. Computers & Security. 2018 Jun 1;75: 24-35.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 02
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received March 12, 2024
Accepted April 14, 2024
Published May 2, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]