University Cyber Security and Programming Skills Analysis Report
VerifiedAdded on  2023/01/19
|9
|1872
|96
Report
AI Summary
This report delves into the intricate relationship between cyber security and programming, highlighting the importance of secure coding practices and the skills required for cyber security professionals. It explores the critical discussion surrounding writing computer programs competently within a cyber security environment, emphasizing the need to avoid vulnerabilities. The report examines the necessity of programming skills for cyber security practitioners, while also acknowledging situations where these skills might be less crucial. Furthermore, it analyzes the impact of GDPR on the cyber security landscape, underscoring the evolving requirements for programmers and the need for continuous adaptation. The report concludes by summarizing the key considerations for programmers in the face of cyber security threats, and how they can enhance their skills in line with the changing regulatory environment.

Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author Note
Cyber Security
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CYBER SECURITY
Table of Contents
Introduction................................................................................................................................2
Critical Discussion about writing computer program competently in the cyber security
environment............................................................................................................................2
Need for programming skills as a professional for a cyber-security practitioner..................3
Lack of need of the programming skills as a professional for a cyber-security practitioner. 4
Changing environment as a result of GDPR..........................................................................4
Conclusion..................................................................................................................................5
References..................................................................................................................................7
Table of Contents
Introduction................................................................................................................................2
Critical Discussion about writing computer program competently in the cyber security
environment............................................................................................................................2
Need for programming skills as a professional for a cyber-security practitioner..................3
Lack of need of the programming skills as a professional for a cyber-security practitioner. 4
Changing environment as a result of GDPR..........................................................................4
Conclusion..................................................................................................................................5
References..................................................................................................................................7

2CYBER SECURITY
Introduction
The world of programming and cyber security is not associated as much with each
other. A programmer does not always specifically focus on the cyber security or did not
understand why they focus should be on this particular topic. It is not understood why a
specific focus should cyber security professionals provide to the programming world and how
programming can help preventing cyber security attacks (Deng et al. 2015). The following
report is therefore created to find out about the relationship between cyber security and
programming with the help of critical discussions about the changing environment in the
cyber world and the focus of the programmers depending on the probable change in security
environment in the cyber world.
Critical Discussion about writing computer program competently in the cyber
security environment
They have been many e very searches done for developing computer software to
secure coding. Secure coding is defined as a practice for the development of computer
software that needs to be done without the inclusion of any unwanted cyber security
vulnerabilities within the programming system (Jajodia et al. 2015). The common
occurrences of Security intrusion mostly follow through the implementation of security
vulnerabilities clipping in a program with the help of logic floors, defects and bugs. These are
the commonly implemented software vulnerability that occurs while programming and which
the programmers need to take intensive care about. It has been identified that a programmer
however does not fully understand the requirement of protecting the security risks during the
writing of a program. In many cases it has been identified as a lack of awareness about the
security vulnerabilities for the programmers (Chandra and Singhal 2016).
Introduction
The world of programming and cyber security is not associated as much with each
other. A programmer does not always specifically focus on the cyber security or did not
understand why they focus should be on this particular topic. It is not understood why a
specific focus should cyber security professionals provide to the programming world and how
programming can help preventing cyber security attacks (Deng et al. 2015). The following
report is therefore created to find out about the relationship between cyber security and
programming with the help of critical discussions about the changing environment in the
cyber world and the focus of the programmers depending on the probable change in security
environment in the cyber world.
Critical Discussion about writing computer program competently in the cyber
security environment
They have been many e very searches done for developing computer software to
secure coding. Secure coding is defined as a practice for the development of computer
software that needs to be done without the inclusion of any unwanted cyber security
vulnerabilities within the programming system (Jajodia et al. 2015). The common
occurrences of Security intrusion mostly follow through the implementation of security
vulnerabilities clipping in a program with the help of logic floors, defects and bugs. These are
the commonly implemented software vulnerability that occurs while programming and which
the programmers need to take intensive care about. It has been identified that a programmer
however does not fully understand the requirement of protecting the security risks during the
writing of a program. In many cases it has been identified as a lack of awareness about the
security vulnerabilities for the programmers (Chandra and Singhal 2016).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CYBER SECURITY
This particular problem has given rise to various incompetencies in programming
followed by the occurrence of insecure coding practices leading to security issues. Therefore
it has been identified that a particular programmer can only develop specific program with
the help of the exploitation of software vulnerabilities that identifies all the security issues
during the creation of a particular program. When the defects, logic floors, bags and other
inconsistencies helping in the creation of malpractices in computer programming is avoided,
only then there would be a provision of writing a computer program in the most competent
way in the computer security environment.
Need for programming skills as a professional for a cyber-security practitioner
It has been found that in most cases, programmers do not emphasize on the security
aspect of the development of any product, application or solution that may help in the
creation of a situation that would lead to further problems for the organisations involved
within the development of the project rather than the programmers involved. Thus, it needs to
be understood why a programmer needs to go through the concept of cyber security while
developing a particular program. It can also occur that the resources and network through
which an organisation is devising the plan of developing a program can be controlled by an
unauthorised user for a malicious attacker through the existing vulnerabilities (Alom and
Taha 2017). The organisations have started to think about this aspect of the programming
division, and this is why the programmers are also turning their focus on the understanding of
cyber security e and their involvement in developing a successful program foreign
organisation without the involvement of any security vulnerabilities. There are various real
time investigated data about organisations and cities that have been under tremendous cyber
security threat followed by being attacked on purpose. therefore it is required that for
handling a cyber-security problem programming languages need to be utilised to help in the
This particular problem has given rise to various incompetencies in programming
followed by the occurrence of insecure coding practices leading to security issues. Therefore
it has been identified that a particular programmer can only develop specific program with
the help of the exploitation of software vulnerabilities that identifies all the security issues
during the creation of a particular program. When the defects, logic floors, bags and other
inconsistencies helping in the creation of malpractices in computer programming is avoided,
only then there would be a provision of writing a computer program in the most competent
way in the computer security environment.
Need for programming skills as a professional for a cyber-security practitioner
It has been found that in most cases, programmers do not emphasize on the security
aspect of the development of any product, application or solution that may help in the
creation of a situation that would lead to further problems for the organisations involved
within the development of the project rather than the programmers involved. Thus, it needs to
be understood why a programmer needs to go through the concept of cyber security while
developing a particular program. It can also occur that the resources and network through
which an organisation is devising the plan of developing a program can be controlled by an
unauthorised user for a malicious attacker through the existing vulnerabilities (Alom and
Taha 2017). The organisations have started to think about this aspect of the programming
division, and this is why the programmers are also turning their focus on the understanding of
cyber security e and their involvement in developing a successful program foreign
organisation without the involvement of any security vulnerabilities. There are various real
time investigated data about organisations and cities that have been under tremendous cyber
security threat followed by being attacked on purpose. therefore it is required that for
handling a cyber-security problem programming languages need to be utilised to help in the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CYBER SECURITY
development of an understanding within the programmers to not create any loopholes while
developing, which may further lead to the security vulnerability within a system.
Lack of need of the programming skills as a professional for a cyber-security
practitioner
Various programming languages are right now being utilised for the aspect of cyber
security maintenance within an organisation with the help of the developers of the
programmers (Shames, Farokhi and Summers 2017). It is required that any developer is
capable of maintaining proper framework while developing a program so that the
organisations involved with the development do not have to face any issue regarding the
cyber security vulnerabilities. On the other hand there are various applications created in
order for the users in the changing times, that should look about for having a proper
development eliminating all the associated risk of being vulnerable to the cyber-attacks
(Deng et al. 2017). This is because; a laymen user going through that particular application
might not be aware of the security vulnerabilities of the application developed by a
programmer. therefore it is required that a programmer understands all the cyber security
threats that might occur during the development phase and has the ability of getting a set of
data compromised just because they did not comply with the security vulnerabilities during
programming.
Changing environment as a result of GDPR
GDPR or the general data protection regulation is a regulation within the legislative
measures of European Union and the European economic area for enhancing data protection
and information privacy for every individual citizen (Rana et al. 2016). While this particular
legislation aims at providing every individual within the country with the ability to control
their confidential and sensitive private data for any regulatory business, it falls under the
development of an understanding within the programmers to not create any loopholes while
developing, which may further lead to the security vulnerability within a system.
Lack of need of the programming skills as a professional for a cyber-security
practitioner
Various programming languages are right now being utilised for the aspect of cyber
security maintenance within an organisation with the help of the developers of the
programmers (Shames, Farokhi and Summers 2017). It is required that any developer is
capable of maintaining proper framework while developing a program so that the
organisations involved with the development do not have to face any issue regarding the
cyber security vulnerabilities. On the other hand there are various applications created in
order for the users in the changing times, that should look about for having a proper
development eliminating all the associated risk of being vulnerable to the cyber-attacks
(Deng et al. 2017). This is because; a laymen user going through that particular application
might not be aware of the security vulnerabilities of the application developed by a
programmer. therefore it is required that a programmer understands all the cyber security
threats that might occur during the development phase and has the ability of getting a set of
data compromised just because they did not comply with the security vulnerabilities during
programming.
Changing environment as a result of GDPR
GDPR or the general data protection regulation is a regulation within the legislative
measures of European Union and the European economic area for enhancing data protection
and information privacy for every individual citizen (Rana et al. 2016). While this particular
legislation aims at providing every individual within the country with the ability to control
their confidential and sensitive private data for any regulatory business, it falls under the

5CYBER SECURITY
European Union regulation (Kannisto et al. 2016). Since, this is a legislative measure; it is
susceptible to probable changes with respect to the security aspects in the cyber world
(Korkmaz et al. 2016). With the advancements in technology has been making in the latest
times, it is understandable that new technology implementations are happening for which
there was no generated law. The introduction of new technology, the GDPR also needed to be
changed in continuous manner. There indeed are changes in the general data protection
regulation and especially for the development of programs working in cyber security (Folino
and Pisani 2015). It specifies how the developers should look for their competency against
creating a program keeping in mind about the security vulnerabilities. Thus, it is important
that a programmer also understands the security aspects behind programming and make sure
that when working with the cyber world, they understand and maintain proper development
processes.
Conclusion
Therefore, in conclusion, it can be said that, programmers also need to identify the
various aspects of security vulnerabilities during development of a program. Given the recent
era of cyber security, they need to upgrade themselves providing with proper measures to
handle the writing of a program in the era of cyber security. The above report mentions what
are the considerations that a programmer needs to keep in mind before writing a program
given the world of cyber security threats. The report also specifies what area of action the
programmers have already overseen and how they can bring about their competencies
developed as per the changes in the GDPR. The detailed report specify how there has been a
critical analysis about the writing of a computer program in the most competent way in the
cyber security environment, the programming skills that a professional in a cyber-security
environment need to enhance within themselves, the lack of the requirement of proper
European Union regulation (Kannisto et al. 2016). Since, this is a legislative measure; it is
susceptible to probable changes with respect to the security aspects in the cyber world
(Korkmaz et al. 2016). With the advancements in technology has been making in the latest
times, it is understandable that new technology implementations are happening for which
there was no generated law. The introduction of new technology, the GDPR also needed to be
changed in continuous manner. There indeed are changes in the general data protection
regulation and especially for the development of programs working in cyber security (Folino
and Pisani 2015). It specifies how the developers should look for their competency against
creating a program keeping in mind about the security vulnerabilities. Thus, it is important
that a programmer also understands the security aspects behind programming and make sure
that when working with the cyber world, they understand and maintain proper development
processes.
Conclusion
Therefore, in conclusion, it can be said that, programmers also need to identify the
various aspects of security vulnerabilities during development of a program. Given the recent
era of cyber security, they need to upgrade themselves providing with proper measures to
handle the writing of a program in the era of cyber security. The above report mentions what
are the considerations that a programmer needs to keep in mind before writing a program
given the world of cyber security threats. The report also specifies what area of action the
programmers have already overseen and how they can bring about their competencies
developed as per the changes in the GDPR. The detailed report specify how there has been a
critical analysis about the writing of a computer program in the most competent way in the
cyber security environment, the programming skills that a professional in a cyber-security
environment need to enhance within themselves, the lack of the requirement of proper
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6CYBER SECURITY
programming skills appropriate for cyber security practitioner order simple professional
followed by the changing environment due to GDPR.
programming skills appropriate for cyber security practitioner order simple professional
followed by the changing environment due to GDPR.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CYBER SECURITY
References
Alom, M.Z. and Taha, T.M., 2017, May. Network intrusion detection for cyber security on
neuromorphic computing system. In 2017 International Joint Conference on Neural
Networks (IJCNN) (pp. 3830-3837). IEEE.
Chandra, A. and Singhal, A., 2016, February. Study of unit and data flow testing in object-
oriented and aspect-oriented programming. In 2016 International Conference on Innovation
and Challenges in Cyber Security (ICICCS-INBUSH) (pp. 245-250). IEEE.
Deng, S., Yue, D., Fu, X. and Zhou, A., 2015. Security risk assessment of cyber physical
power system based on rough set and gene expression programming. IEEE/CAA Journal of
Automatica Sinica, 2(4), pp.431-439.
Deng, S., Zhou, A.H., Yue, D., Hu, B. and Zhu, L.P., 2017. Distributed intrusion detection
based on hybrid gene expression programming and cloud computing in a cyber physical
power system. IET Control Theory & Applications, 11(11), pp.1822-1829.
Folino, G. and Pisani, F.S., 2015, April. Combining ensemble of classifiers by using genetic
programming for cyber security applications. In European Conference on the Applications of
Evolutionary Computation (pp. 54-66). Springer, Cham.
Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V. and Wang, C. eds., 2015. Cyber
warfare: building the scientific foundation (Vol. 56). Springer.
Kannisto, J., Mäkitalo, N., Aaltonen, T. and Mikkonen, T., 2016, June. Programming model
perspective on security and privacy of social cyber-physical systems. In 2016 IEEE
International Conference on Mobile Services (MS) (pp. 87-94). IEEE.
References
Alom, M.Z. and Taha, T.M., 2017, May. Network intrusion detection for cyber security on
neuromorphic computing system. In 2017 International Joint Conference on Neural
Networks (IJCNN) (pp. 3830-3837). IEEE.
Chandra, A. and Singhal, A., 2016, February. Study of unit and data flow testing in object-
oriented and aspect-oriented programming. In 2016 International Conference on Innovation
and Challenges in Cyber Security (ICICCS-INBUSH) (pp. 245-250). IEEE.
Deng, S., Yue, D., Fu, X. and Zhou, A., 2015. Security risk assessment of cyber physical
power system based on rough set and gene expression programming. IEEE/CAA Journal of
Automatica Sinica, 2(4), pp.431-439.
Deng, S., Zhou, A.H., Yue, D., Hu, B. and Zhu, L.P., 2017. Distributed intrusion detection
based on hybrid gene expression programming and cloud computing in a cyber physical
power system. IET Control Theory & Applications, 11(11), pp.1822-1829.
Folino, G. and Pisani, F.S., 2015, April. Combining ensemble of classifiers by using genetic
programming for cyber security applications. In European Conference on the Applications of
Evolutionary Computation (pp. 54-66). Springer, Cham.
Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V. and Wang, C. eds., 2015. Cyber
warfare: building the scientific foundation (Vol. 56). Springer.
Kannisto, J., Mäkitalo, N., Aaltonen, T. and Mikkonen, T., 2016, June. Programming model
perspective on security and privacy of social cyber-physical systems. In 2016 IEEE
International Conference on Mobile Services (MS) (pp. 87-94). IEEE.

8CYBER SECURITY
Korkmaz, E., Dolgikh, A., Davis, M. and Skormin, V., 2016, June. Industrial control systems
security testbed. In 11th Annual Symposium on Information Assurance.
Rana, M.M., Li, L. and Su, S.W., 2016, July. Cyber attack protection and control in
microgrids using channel code and semidefinite programming. In 2016 IEEE Power and
Energy Society General Meeting (PESGM) (pp. 1-5). IEEE.
Shames, I., Farokhi, F. and Summers, T.H., 2017. Security analysis of cyber-physical systems
using $\mathcal {H} _2 $ H 2 norm. IET Control Theory & Applications, 11(11), pp.1749-
1755.
Korkmaz, E., Dolgikh, A., Davis, M. and Skormin, V., 2016, June. Industrial control systems
security testbed. In 11th Annual Symposium on Information Assurance.
Rana, M.M., Li, L. and Su, S.W., 2016, July. Cyber attack protection and control in
microgrids using channel code and semidefinite programming. In 2016 IEEE Power and
Energy Society General Meeting (PESGM) (pp. 1-5). IEEE.
Shames, I., Farokhi, F. and Summers, T.H., 2017. Security analysis of cyber-physical systems
using $\mathcal {H} _2 $ H 2 norm. IET Control Theory & Applications, 11(11), pp.1749-
1755.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.