SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
WHITE PAPER ON
                           SECURITY TESTING




http://www.360logica.com
info@360logica.com                      White Paper
360LOGICA SOFTWARE TESTING COMPANY                                                                                { WHITE PAPER ON SECURITY TESTING }




                                                                                            Introduction
                                                                                             Owing to the ever changing business dynamics more and more or-
                                                                                             ganizations are shifting to the web. This shift is not just customer
                                                                                             centric but internal as well. In terms of customer, be it business to
                                                                                             business or business to customer everything is being nearly trans-
                                                                                             acted via web. Even from internal infrastructure perspective compa-
                                                                                             nies are shifting to cloud, taking SaaS model etc to ease their opera-
                                                                                             tions and availability. In all this dynamics the security becomes an
                                                                                             utmost factor to be considered. Looking at the delicacy of web secu-
                                                                                             rity measures a firm is taking, independent testing firms came into the
                                                                                             picture. This shift leaves firms vulnerable to unexpected security
                                                                                             threats. It is also collective effort of the service providers, cloud ser-
                                                                                             vice providers to ensure security and integrity of an enterprise is
                                                                                             maintained.




       Need of INDEPENDENT Testing Firms
                                                                                           Software Testing in Various development methodologies




     The product or service in its inception is developed keeping in view the expected       Waterfall model has been in quite usage from some time. Nor-
     the results or criteria which it is intended to be put to use. The user is also ex-     mally the flow in the model is as follows:
     pected to use the application in a particular fashion but the case is always not
     the same. Today with the advancement and availability of technology the end             • System feasibility -> Requirement analysis -> System design ->
     user is quite versatile and sometimes mischievous in a manner of speaking.              Coding and unit testing. In this phase, the actual coding is done for the
                                                                                             various modules. Generally the coder himself reviews the code and
     The breach in security of web-site or as a matter of fact any application/service       individually test the functionality of each module -> Integration and
     can be intentional as well as non-intentional. As a provider of service/product we      system testing. In this phase, integration of all the modules in the
     can pray for the user to use it in the desired manner but one has to be prepared        system is done and testing is done of the entire system, making sure
     for the unexpected use also. While taking security measures one has to think            that the modules meet the requirements. -> Deployment and mainte-
     from intentional perspectives as well. A person who has written a code himself          nance. In this phase, the software is deployed in the production envi-
     can be at loss in testing/verifying the code from the view point of finding “loop       ronment. One can rectify any errors that are identified in this phase,
     holes”. One has to think from intentional perspective or popularly ethical              and tweak the functionality based on the updated requirements.
     Hacker’s perspective.

     The independent testing firms with expertise in niche skill domain can come in
     very handy in making a service or product robust. With the varied pool of talent
     and the right mix of approach the testing firms can provide the essential or fix
     the points where an application can be toyed with.




http://www.360logica.com
info@360logica.com                                                                                                                                      White Paper
360LOGICA SOFTWARE TESTING COMPANY                                                                              { WHITE PAPER ON SECURITY TESTING }




                                                                                       Manual vs Automated testing

                                                                                       Manual testing though very useful for checking the nuts and bolts of the
                                                                                       code written but may lack in scanning the entire module on a comprehen-
                                                                                       sive note.

                                                                                       Automated testing owing to its comprehensive nature is quite good in
                                                                                       identifying the threats and when coupled with manual testing it can prove
                                                                                       to be very beneficial.
                                                                                       A code may be tested by various techniques like SQL injection, code
                                                                                       injection, remote code inclusion and cross-site scripting, an automated
                                                                                       tool can come in handy to automate testing of these techniques but an
                                                                                       experienced tester can prove more valuable who along with his “out of the
                                                                                       box thinking” can test the application by subjecting it to unexpected at-
                                                                                       tacks.

                                                                                       The best practices would facilitate tweaking the script of Automation tool
                                                                                       (IBM Ad Scan, Peros, QA inspect etc) depending upon the technical
                                                                                       requirement of the code to be tested and then taking the manual ap-
                                                                                       proach to rectify the end results. In this scenario the manual tester is
                                                                                       preferred who has the expertise over the required domain.




       Conclusion
       With the advancement of more and more people shifting to web based appli-
       cations, which definitely makes life and work easy one has to take care of
       threats which comes with the package.

       Threats are not just for the consumer but for the enterprises as well. Common
       threats can be like Web-based attacks, Social phishing, Malicious data loss
       etc. One has to take care of prevention mechanism rather responsive
       mechanism.




http://www.360logica.com
info@360logica.com                                                                                                                                   White Paper

Mais conteúdo relacionado

Mais de 360logica Software Testing Services (A Saksoft Company)

Mais de 360logica Software Testing Services (A Saksoft Company) (10)

The future of the capital markets industry
The future of the capital markets industryThe future of the capital markets industry
The future of the capital markets industry
 
Case Study : Manual & Automation Testing
Case Study : Manual & Automation TestingCase Study : Manual & Automation Testing
Case Study : Manual & Automation Testing
 
Case Study : Performance Testing (Educational Services)
Case Study : Performance Testing (Educational Services)Case Study : Performance Testing (Educational Services)
Case Study : Performance Testing (Educational Services)
 
Case study: Performance Testing using Load Runner
Case study: Performance Testing using Load RunnerCase study: Performance Testing using Load Runner
Case study: Performance Testing using Load Runner
 
Selenium php framework_case_study
Selenium php framework_case_studySelenium php framework_case_study
Selenium php framework_case_study
 
Software testing basics and its types
Software testing basics and its typesSoftware testing basics and its types
Software testing basics and its types
 
Software testing and analysis
Software testing and analysisSoftware testing and analysis
Software testing and analysis
 
Quality in Software Testing
Quality in Software TestingQuality in Software Testing
Quality in Software Testing
 
Software testing - An Overview
Software testing - An OverviewSoftware testing - An Overview
Software testing - An Overview
 
Software testing
Software testingSoftware testing
Software testing
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

White paper security_testing

  • 1. WHITE PAPER ON SECURITY TESTING http://www.360logica.com info@360logica.com White Paper
  • 2. 360LOGICA SOFTWARE TESTING COMPANY { WHITE PAPER ON SECURITY TESTING } Introduction Owing to the ever changing business dynamics more and more or- ganizations are shifting to the web. This shift is not just customer centric but internal as well. In terms of customer, be it business to business or business to customer everything is being nearly trans- acted via web. Even from internal infrastructure perspective compa- nies are shifting to cloud, taking SaaS model etc to ease their opera- tions and availability. In all this dynamics the security becomes an utmost factor to be considered. Looking at the delicacy of web secu- rity measures a firm is taking, independent testing firms came into the picture. This shift leaves firms vulnerable to unexpected security threats. It is also collective effort of the service providers, cloud ser- vice providers to ensure security and integrity of an enterprise is maintained. Need of INDEPENDENT Testing Firms Software Testing in Various development methodologies The product or service in its inception is developed keeping in view the expected Waterfall model has been in quite usage from some time. Nor- the results or criteria which it is intended to be put to use. The user is also ex- mally the flow in the model is as follows: pected to use the application in a particular fashion but the case is always not the same. Today with the advancement and availability of technology the end • System feasibility -> Requirement analysis -> System design -> user is quite versatile and sometimes mischievous in a manner of speaking. Coding and unit testing. In this phase, the actual coding is done for the various modules. Generally the coder himself reviews the code and The breach in security of web-site or as a matter of fact any application/service individually test the functionality of each module -> Integration and can be intentional as well as non-intentional. As a provider of service/product we system testing. In this phase, integration of all the modules in the can pray for the user to use it in the desired manner but one has to be prepared system is done and testing is done of the entire system, making sure for the unexpected use also. While taking security measures one has to think that the modules meet the requirements. -> Deployment and mainte- from intentional perspectives as well. A person who has written a code himself nance. In this phase, the software is deployed in the production envi- can be at loss in testing/verifying the code from the view point of finding “loop ronment. One can rectify any errors that are identified in this phase, holes”. One has to think from intentional perspective or popularly ethical and tweak the functionality based on the updated requirements. Hacker’s perspective. The independent testing firms with expertise in niche skill domain can come in very handy in making a service or product robust. With the varied pool of talent and the right mix of approach the testing firms can provide the essential or fix the points where an application can be toyed with. http://www.360logica.com info@360logica.com White Paper
  • 3. 360LOGICA SOFTWARE TESTING COMPANY { WHITE PAPER ON SECURITY TESTING } Manual vs Automated testing Manual testing though very useful for checking the nuts and bolts of the code written but may lack in scanning the entire module on a comprehen- sive note. Automated testing owing to its comprehensive nature is quite good in identifying the threats and when coupled with manual testing it can prove to be very beneficial. A code may be tested by various techniques like SQL injection, code injection, remote code inclusion and cross-site scripting, an automated tool can come in handy to automate testing of these techniques but an experienced tester can prove more valuable who along with his “out of the box thinking” can test the application by subjecting it to unexpected at- tacks. The best practices would facilitate tweaking the script of Automation tool (IBM Ad Scan, Peros, QA inspect etc) depending upon the technical requirement of the code to be tested and then taking the manual ap- proach to rectify the end results. In this scenario the manual tester is preferred who has the expertise over the required domain. Conclusion With the advancement of more and more people shifting to web based appli- cations, which definitely makes life and work easy one has to take care of threats which comes with the package. Threats are not just for the consumer but for the enterprises as well. Common threats can be like Web-based attacks, Social phishing, Malicious data loss etc. One has to take care of prevention mechanism rather responsive mechanism. http://www.360logica.com info@360logica.com White Paper