%0 Journal Article %T Secure Coding Guidelines — Python %J The ISC International Journal of Information Security %I Iranian Society of Cryptology %Z 2008-2045 %A A. Hammoudeh, Mohammad Ali %A Ibrahim, Renad %A Alshraryan, Lama %A Alnomise, Manar %A Alhumidan, Ragad %D 2021 %\ 11/01/2021 %V 13 %N 3 %P 31-38 %! Secure Coding Guidelines — Python %K Cybersecurity %K Secure Coding Practices %K Coding Guidelines %K vulnerabilities %K OWSAP %K Python Challenges %K Sql Injection %R 10.22042/isecure.2021.13.3.0 %X Recently, the interest in cybercrime and cybersecurity has increased dramatically both in terms of critical security issues and national economic information infrastructure and sensitive dealing policies, such as protection and data privacy. Moreover, the growing threat of cybersecurity has prompted the kingdom to pay more attention to its national cybersecurity strategy as the state embarks on a Vision 2030 plan, which aims to diversify the economy and create new jobs. Therefore, Any Computer system is always having security threats which are considered as a big problem and this including application Codes as increasing demand. The paper aims to give a detailed information about secure coding with Python and present security guidelines and considerations in different disciplines. It focuses on giving an overview of the authentication methods used in application (Code) and show program security mistakes to introduce vulnerabilities (Ex. SQL Injection). We reviewthe new user authentication techniques, making it easier for the manager to choose the appropriate techniques for his organization by understanding the way it works, advantages, and disadvantages. The administrator can integratethese mechanisms in a manner that is appropriate for his security plan. This will be useful for programmers and users to keep their codes and applications more secure and viable for usage in sensitive environments. %U https://www.isecure-journal.com/article_150541_a9f0526e45cd43bc510cc2945ddfcf80.pdf