2. A Brief Introduction Of VERISIGN:
VeriSign Inc (NASDAQ:VRSN) was founded in 1995 as a spin of RSA
Security certification service business.
The company served as a Certificate authority (CA) and its initial
mission was providing trust for the Internet and Electronic Commerce
through Digital Authentication services and products and to enable
and protect all forms of interactions on voice and Data Networks.
Everyday around 18 billion internet interactions are processed and over
100 million phone calls are supported. They also provide services that
help over 3000 enterprises and 500000 Web sites to operate securely,
reliably and efficiently.
3. IDefense security intelligence services
VeriSign iDefense Security Intelligence Services gives information
security executives 24/7 access to accurate and actionable cyber
intelligence related to vulnerabilities, malicious code, and global
threats.
With VeriSign iDefense, organizations have an experienced
multinational network of security experts acting as an extension of
their teams and exclusive access to the most in-depth cyber threat
intelligence available.
This translates into a security strategy that consistently delivers
substantial cost savings with proactive insights on true threats, the
intelligence to avoid false alarms and revenue protection through
improved system and application availability.
4. Mission of IDefense
The mission of VeriSign iDefense intelligence research is to
collect, analyze and package intelligence of importance in
order to provide security practitioners with situational
awareness and mitigation strategies pertaining to
enterprise threats.
The VeriSign iDefense global intelligence network includes
hundreds of vulnerability researchers around the globe; a
dedicated cyber intelligence team conducting threat
research in more than 20 spoken languages and ongoing
field operations in suspect regions of the world - all
providing insight into the cyber underground,
undiscovered vulnerabilities and global threats.
5. Methodology
VeriSign iDefense Security Intelligence Services deliver
timely, proactive intelligence using a proven methodology
for discovery and analysis.
The existence of vulnerability does not always pose a threat
to the enterprise. With finite resources and more organized
attackers, defense of critical IT assets requires security
intelligence – knowing which threats pose the greatest risk
to an organization’s infrastructure and business goals or
mission.
7. Software Development Methodology
The development methodology used in idefense is Agile Software
Development Methodology.
Definition:
Agile software development is a conceptual framework for
software engineering that promotes development iterations
throughout the life cycle of the project.
Agile development methodology attempts to provide many
opportunities to assess the direction of a project throughout the
development lifecycle.
8. Scrum Methodology
Scrum is a process of implementing Agile, where features are
delivered in30days sprints also known as iterations.
Roles of Scrum
Scrum has three fundamental roles:
1. Product Owner
2. ScrumMaster and
3.Team member.
10. TESTING PROCESS
A primary purpose of testing is to detect software failures so that defects
may be discovered and corrected.
• Manual Testing
• Automation Testing
Comparison of Manual and Automation Testing:
11. Automation Testing
Code-driven testing: The public (usually) interfaces to
classes, modules or libraries are tested with a variety of
input arguments to validate that the results that are
returned are correct.
Graphical user interface testing: A testing framework
generates user interface events such as keystrokes and
mouse clicks, and observes the changes that result in the
user interface, to validate that the observable behavior of
the program is correct.