1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
5

The SEI/CERT website is full of best-practices for developing secure code for various popular programming languages. Select a so

ftware threat/vulnerability of your choice and idenitfy two secure coding practices to mitigate that threat/vulnerability. You may choose any programming language you wish.
Computers and Technology
1 answer:
kakasveta [241]3 years ago
5 0

Answer:  

Input-Output rule:  

char *file_name:

FILE *f+ptr;  

f_ptr = fopen(file_name, "w");

if(f_ptr == NULL){

}  

if(fclose(f_ptr)!=0){

}  

if(remove(file_name) !=0){

}  

Expression:  

void set_fl(int num ,int *s_fl){

if(NULL == s_fl){

return;

}  

if(num>0){

*s_fl =1;

}

else if(num <0) {

*s_fl = -1;

}

}  

int is_negative(int num) {

int s;

set_fl(num , &s);

return s<0;

Explanation:  

Computer Emergency Response Team(CERT) has found most vulnerabilities discovered in applications stem from a comparatively small number of common programming errors that developers repeatedly make. The CERT secure coding initiative is functioning to determine secure coding standards for commonly used programming languages and to advance the practice of secure coding.

There are many security coding practices:  

SEI CERT C coding standard:  

The C rules and proposals are a piece ongoing and reflect the present thinking of the secure coding community. As rules and proposals mature, they're published in report or book form as official releases.

You might be interested in
A form letter can be customized by using different fields in a __________.
alexgriva [62]
I think the answer to this is  C.email
4 0
3 years ago
Read 2 more answers
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
3 years ago
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other
dezoksy [38]

Answer: False

Explanation:

 The given statement is false, as the alarm filtering is the process of classifying the various type of IDPS alert in the system and it can be managed more efficiently.

The IDPS administrator can easily set an alarm filtering in the running system. It can generate the various types of positive tract in the system and then adjust the different alarm classifications. Alarm filters are same as the packet filter in which they can easily filter the items from the source and destination IP address.

3 0
3 years ago
. Find the supplements of : 150' and 70°​
suter [353]
30 is the supplement of 150
7 0
3 years ago
A(n ________ cpu has two processing paths, allowing it to process more than one instruction at a time.
Alik [6]
#1) A(n ________ cpu has two processing paths, allowing it to process more than one instruction at a time.
Answer: Multi-core. A multi-core processor is a single computing component with two or more independent actual processing units (called "cores"), which are units that read and execute program instructions. The instructions are ordinary CPU instructions, but the multiple cores can run multiple instructions at the same time, increasing overall speed for programs.
8 0
4 years ago
Read 2 more answers
Other questions:
  • Write a unit test for addInventory(). Call redSweater.addInventory() with parameter sweaterShipment. Print the shown error if th
    9·2 answers
  • An enterprise DBMS is automatically capable of serving as a mobile DBMS. There are no special issues raised by mobility. True Fa
    11·1 answer
  • Which of these are correctly formatted python dictionaries? Check all that apply.
    5·2 answers
  • For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can acc
    5·1 answer
  • Using a for loop, print the decimal equivalents of ½, 1/3, ¼, … 1/10. Also, using a while loop, print the decimal equivalents of
    6·1 answer
  • EVERYONE PLS JOIN MY GOOGLE CLASSROOM<br> CODE: clmvjbd
    13·2 answers
  • Lan is working on a project report that will go through multiple rounds of
    10·1 answer
  • Which of the following BEST describes Computer Science (CS)?
    8·1 answer
  • What do you notice about the cinematography
    14·1 answer
  • Benchmark test compare similar systems performing in which tasks
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!