Developer’s guide to cyber security