Secure Coding in Five Steps
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is over...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Kennesaw State University
2021-07-01
|
| Series: | Journal of Cybersecurity Education, Research & Practice |
| Online Access: | https://digitalcommons.kennesaw.edu/jcerp/vol2021/iss1/5/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849428044356255744 |
|---|---|
| author | Mini Zeng Feng Zhu |
| author_facet | Mini Zeng Feng Zhu |
| author_sort | Mini Zeng |
| collection | DOAJ |
| description | Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in academia to introduce secure coding components into computer science curriculum, but a big gap between industry best practices and workforce skills still exists. Unlike many existing efforts, we focus on both the big picture of secure coding and hands-on projects. To achieve these two goals, we present five learning steps that we have been revising over the last four years. Our evaluation shows that the approach reduces complexity and encourages students to use secure coding practice in their future projects. |
| format | Article |
| id | doaj-art-40cb4ea0319b48ddaf86e60fa96dc6b5 |
| institution | Kabale University |
| issn | 2472-2707 |
| language | English |
| publishDate | 2021-07-01 |
| publisher | Kennesaw State University |
| record_format | Article |
| series | Journal of Cybersecurity Education, Research & Practice |
| spelling | doaj-art-40cb4ea0319b48ddaf86e60fa96dc6b52025-08-20T03:28:50ZengKennesaw State UniversityJournal of Cybersecurity Education, Research & Practice2472-27072021-07-0120211Secure Coding in Five StepsMini Zeng0Feng Zhu1Jacksonville UniversityUniversity of Alabama in HuntsvilleSoftware vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in academia to introduce secure coding components into computer science curriculum, but a big gap between industry best practices and workforce skills still exists. Unlike many existing efforts, we focus on both the big picture of secure coding and hands-on projects. To achieve these two goals, we present five learning steps that we have been revising over the last four years. Our evaluation shows that the approach reduces complexity and encourages students to use secure coding practice in their future projects.https://digitalcommons.kennesaw.edu/jcerp/vol2021/iss1/5/ |
| spellingShingle | Mini Zeng Feng Zhu Secure Coding in Five Steps Journal of Cybersecurity Education, Research & Practice |
| title | Secure Coding in Five Steps |
| title_full | Secure Coding in Five Steps |
| title_fullStr | Secure Coding in Five Steps |
| title_full_unstemmed | Secure Coding in Five Steps |
| title_short | Secure Coding in Five Steps |
| title_sort | secure coding in five steps |
| url | https://digitalcommons.kennesaw.edu/jcerp/vol2021/iss1/5/ |
| work_keys_str_mv | AT minizeng securecodinginfivesteps AT fengzhu securecodinginfivesteps |