TY - JOUR ID - 150541 TI - Secure Coding Guidelines — Python JO - The ISC International Journal of Information Security JA - ISECURE LA - en SN - 2008-2045 AU - A. Hammoudeh, Mohammad Ali AU - Ibrahim, Renad AU - Alshraryan, Lama AU - Alnomise, Manar AU - Alhumidan, Ragad AD - Department of Information Technology, College of Computer, Qassim University, Buraydah, Saudi Arabia. Y1 - 2021 PY - 2021 VL - 13 IS - 3 SP - 31 EP - 38 KW - Cybersecurity KW - Secure Coding Practices KW - Coding Guidelines KW - vulnerabilities KW - OWSAP KW - Python Challenges KW - Sql Injection DO - 10.22042/isecure.2021.13.3.0 N2 - Recently, the interest in cybercrime and cybersecurity has increased dramatically both in terms of critical security issues and national economic information infrastructure and sensitive dealing policies, such as protection and data privacy. Moreover, the growing threat of cybersecurity has prompted the kingdom to pay more attention to its national cybersecurity strategy as the state embarks on a Vision 2030 plan, which aims to diversify the economy and create new jobs. Therefore, Any Computer system is always having security threats which are considered as a big problem and this including application Codes as increasing demand. The paper aims to give a detailed information about secure coding with Python and present security guidelines and considerations in different disciplines. It focuses on giving an overview of the authentication methods used in application (Code) and show program security mistakes to introduce vulnerabilities (Ex. SQL Injection). We reviewthe new user authentication techniques, making it easier for the manager to choose the appropriate techniques for his organization by understanding the way it works, advantages, and disadvantages. The administrator can integratethese mechanisms in a manner that is appropriate for his security plan. This will be useful for programmers and users to keep their codes and applications more secure and viable for usage in sensitive environments. UR - https://www.isecure-journal.com/article_150541.html L1 - https://www.isecure-journal.com/article_150541_a9f0526e45cd43bc510cc2945ddfcf80.pdf ER -