Secure Coding
From Wikipedia, the free encyclopedia
| This article has no lead section. To comply with Wikipedia's lead section guidelines, one should be written. Please discuss this issue on the talk page and read the lead section guide to make sure the introduction summarizes the article. |
| This article does not cite any references or sources. (May 2008) Please help improve this article by adding citations to reliable sources. Unverifiable material may be challenged and removed. |
History has proven that software defects, bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities. Through the analysis of thousands of reported vulnerabilities, security professionals have discovered that most vulnerabilities stem from a relatively small number of common software programming errors. By identifying the insecure coding practices that lead to these errors and educating developers on secure alternatives, organizations can take proactive steps to help significantly reduce or eliminate vulnerabilities in software before deployment.

