Secure Coding Practises for Enhancing the Art of Ethical Hacking: A Comprehensive Study

Year : 2024 | Volume :02 | Issue : 01 | Page : –
By

Mohammad Samreen

Mohammad Samreen

Manas Kumar Yogi

  1. Student Computer Science and Engineering Department, Pragati Engineering College (Autonomous), Surampalem Andhra Pradesh India
  2. Assistant Professor Computer Science and Engineering Department, Pragati Engineering College (Autonomous), Surampalem Andhra Pradesh India

Abstract

In the quickly developing scene of network safety, secure coding and moral hacking are essential for strengthening computerized environments. Secure coding systems and moral hacking are linked to digital strength. This study examines the relationship between secure coding and moral hacking, emphasizing the importance of a hierarchical culture that focuses on secure coding standards. Attention to detail in software development can protect against malicious exploits. Security considerations are integrated throughout the development lifecycle to prevent cyber threats. Expertise in ethical hacking is utilized to uncover code vulnerabilities, highlighting the importance of secure coding practices in risk mitigation within organizations. culture must prioritize secure coding principles and foster collaboration. A combination of defensive and offensive strategies creates a resilient cybersecurity ecosystem. Secure coding practices contribute to the enhancement of ethical hacking. The relationship between secure coding practices and ethical hacking is intertwined with cybersecurity. Secure coding is essential for preventing common vulnerabilities. Threat modeling helps developers design resilient systems. Furthermore, it explores the integration of automated security testing tools, static code analysis, and continuous monitoring to identify vulnerabilities early in the development process, contributing to a more secure codebase. Research examines ethical hacking through penetration testing and red teaming. Ethical hackers can use adversarial knowledge to improve cybersecurity. Secure coding is essential for software resilience. Expanding its purview, the research investigates the application of DevSecOps principles, showcasing how the integration of security measures into the development and operational processes enhances the agility and security posture of software systems. Organizations should focus on security-first mindsets to avoid ethical hacking. Research aims to create a digital landscape that can withstand cyber threats.

Keywords: Authentication, Authorization, Security, Coding, Encryption

[This article belongs to International Journal of Wireless Security and Networks(ijwsn)]

How to cite this article: Mohammad Samreen, Mohammad Samreen, Manas Kumar Yogi. Secure Coding Practises for Enhancing the Art of Ethical Hacking: A Comprehensive Study. International Journal of Wireless Security and Networks. 2024; 02(01):-.
How to cite this URL: Mohammad Samreen, Mohammad Samreen, Manas Kumar Yogi. Secure Coding Practises for Enhancing the Art of Ethical Hacking: A Comprehensive Study. International Journal of Wireless Security and Networks. 2024; 02(01):-. Available from: https://journals.stmjournals.com/ijwsn/article=2024/view=144851





References

  1. Meng N, Nagy S, Yao D, Zhuang W, Argoty GA. Secure coding practices in java: Challenges and vulnerabilities. InProceedings of the 40th International Conference on Software Engineering 2018 May 27 (pp. 372-383).
  2. Gupta A, Anand A. Ethical hacking and hacking attacks. Int. J. Eng. Comput. Sci. 2017 Apr 4;6(6):2319-7242.
  3. Maurushat A. Ethical hacking. University of Ottawa Press/Les Presses de l’Université d’Ottawa; 2019.
  4. Baloch, Rafay. Ethical hacking and penetration testing guide. Auerbach Publications, 2017.
  5. Macnish, Kevin, and Jeroen Van der Ham. “Ethics in cybersecurity research and practice.” Technology in society 63 (2020): 101382.
  6. Najera-Gutierrez G, Ansari JA. Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux. Packt Publishing Ltd; 2018 Feb 28.
  7. Liguori P, Al-Hossami E, Orbinato V, Natella R, Shaikh S, Cotroneo D, Cukic B. EVIL: exploiting software via natural language. In2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE) 2021 Oct 25 (pp. 321-332). IEEE.
  8. Raman R, Calyam P, Achuthan K. ChatGPT or Bard: Who is a better Certified Ethical Hacker? Computers & Security. 2024 May 1;140: 103804.
  9. Gupta M, Akiri C, Aryal K, Parker E, Praharaj L. From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy. IEEE Access. 2023 Aug 1.
  10. Cabaj K, Domingos D, Kotulski Z, Respício A. Cybersecurity education: Evolution of the discipline and analysis of master programs. Computers & Security. 2018 Jun 1;75: 24-35.

Regular Issue Subscription Review Article
Volume 02
Issue 01
Received March 12, 2024
Accepted April 14, 2024
Published May 2, 2024