NSA: Cybersecurity Information Sheet
NSA: Software Memory Safety
Brief Description: The Executive Summary states that Software Developers are encouraged away from programming languages like C and C++ due to the "...freedom and flexibility in memory management while relying heavily on the programmer to perform the needed checks on memory references."
It describes memory safety issues being addressed from Microsoft records (2006 to 2018) due to "overflowing memory buffers and leveraging issues with how software allocates and deallocates memory."
Multiple programming languges have been tested and recommended for use to relieve this issue with languages such as "C#, Go, Java®, Ruby™, Rust®, and Swift®."
Review: This arrives as an article through newsfeed from National Security Agency with the White House on cybersecurity recommendations for software preference and programming.
It explains a programmer's logic, syntax, testing, and validation methods are unclear in the program to create access points using I/O code in an engineering perspective to re-create a sub-program hosted by memory that has not been properly protected or contained. The type of programming language (C, C++) are versatile and require more safety procedure than accessibility for daily operations. '
If your program, daily operations with your software language, are eating up memory without preventative maintenance within the code itself, you may want to reconsider the infrastructure you work with. This is an online revenue and can be costly with the resources you use. If the programming language is not up to terms in safety protocols, it's time to reconsider and make sure that your developer team knows the remedy!
No comments:
Post a Comment