{"title":"Secure applications — Hack-proofing your app","authors":"H. Todd","doi":"10.1109/EIT.2010.5612126","DOIUrl":null,"url":null,"abstract":"The biggest cyber threat today is insecure applications. Do you write rugged hacker resistant software? If you don't you should! You should know about the threats and how to \"bake\" security in during each phase of the Software Development Life Cycle (SDLC).","PeriodicalId":305049,"journal":{"name":"2010 IEEE International Conference on Electro/Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Conference on Electro/Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT.2010.5612126","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The biggest cyber threat today is insecure applications. Do you write rugged hacker resistant software? If you don't you should! You should know about the threats and how to "bake" security in during each phase of the Software Development Life Cycle (SDLC).