Ending Soon! Save 33% on All Access

Report: Programming Errors Compromise Software Security

By Entrepreneur Staff

Every year, millions of computers are infected with viruses, and databases with sensitive consumer data are hacked. According to a report by the SANS Institute, a leading organization for computer security training, these security breaches are a result of poor programming.

Together with 30 top international cyber security experts, the SANS Institute has published The Top 25 Most Dangerous Programming Errors, identifying the most common and dangerous programming oversights. In fact, the impact of these errors is so widespread, just two of them--SQL injection (CWE-89) and cross-site scripting (CWE-79)--resulted in more than 1 million website security breaches. Those security breaches flow into the computers of website visitors, rendering their computers inoperable.

According to Steve Christey, principal information security engineer for The MITRE Corp., as well as editor and technical coordinator of Top 25, the purpose of the report is to raise awareness about the small errors made by programmers that result it major security problems. The commission also wanted to arm consumers with information to enable them to demand more secure software programs.

"Universities teach technique," Christey says, "but many programmers come out [of college] never having heard the word security in their classes."

With the push to produce more and more software, the focus is often on creating new code, and producing it quickly. In this environment, the security of the programs becomes an ancillary concern, if it is addressed at all.

The SANS Institute and its affiliates hope the Top 25 report will be a catalyst to forcing the technology industry, which is heavily dependent on software, to create more secure programs. However, Christey notes that it is up to consumers--especially business owners who collect sensitive consumer information--to attach security standards to their software requests. If software consumers demand more secure programs, software developers will be motivated to create better programs in order to compete.

"If developers learn to program more securely," Christey says, "ultimately, they will learn to create better programs."

The Top 25 list was broken down into three categories: insecure interaction between components, risky resource management, and porous defenses. It should come as no surprise that the most common and dangerous programming errors fall into the first category, with improper input validation (CWE-20) identified as the No. 1 killer of healthy software.

Visit http://www.sans.org/top25errors/ to read the full report and find out more about the Top 25 Most Dangerous Programming Errors.

-- Kimberlee Morrison

Entrepreneur Staff

Entrepreneur Staff

Editor

For more than 30 years, Entrepreneur has set the course for success for millions of entrepreneurs and small business owners. We'll teach you the secrets of the winners and give you exactly what you need to lay the groundwork for success.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Business News

Apple iPhone 7 Users May Be Owed a Slice of a $35 Million Settlement — Here's How to Claim Your Share

Previous (and current, no judgment) iPhone 7 users may be entitled to up to $349. The deadline to file a claim is June 3.

Leadership

Clinton Sparks Podcast: Global BMX Star Shares His Entrepreneurial Journey

This podcast is a fun, entertaining and informative show that will teach you how to succeed and achieve your goals with practical advice and actionable steps given through compelling stories and conversations with Clinton and his guests.

Starting a Business

Clinton Sparks Podcast: From Pepsi, Beats to Netflix — This Powerful CMO Shows How to Never Let Your Light Dim

Learn about the challenges high achievers face, the tenacity required to conquer self-doubt and the continuous pursuit of excellence.

Business News

Here Are the Cheapest Online MBAs You Can Do From Your Couch, According to a New Report

No in-person interaction is necessary and most cost less than $10,000.