Solved

help classify if secure coding is optional & priority of implementation

Posted on 2016-07-17
1
74 Views
Last Modified: 2016-07-17
As there's shortage of resource & time, I need to take out some of the implementations
& prioritize the secure (re)-coding implementation.

Anyone care to fill up as much as possible : some of it are filled : refer to blue text
fifth column
Gnl-Secure-Coding-Guideline-v0-3ee.xlsx
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 64

Accepted Solution

by:
btan earned 500 total points
ID: 41715804
Added in yellow on the recommendation - hope it help. you will need to review in your context. Actually fundamental secure coding like avoid unsafe function (and etc) should be for all system and leave it to owner to prioritise instead otherwise it defeat purpose of checklist
Gnl-Secure-Coding-Guideline-v0-3ee-.xlsx
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question