SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
360logica Software Testing Company White Paper




                                                        A White Paper
                                                                    on
                                                      Security Testing




Updated: 24-03-2012

http://www.360logica.com | info@360logica.com
360logica Software Testing Company White Paper




Introduction                                         taking security measures one has to think from
                                                     intentional perspectives as well. A person who
Owing to the ever changing business dynam-           has written a code himself can be at loss in
ics, more and more organizations are shifting        testing/verifying the code from the view point of
to the web. This shift is not just customer cen-     finding “loop holes”. One has to think from in-
tric but internal as well. In terms of customer,     tentional perspective or popularly ethical
be it business to business or business to cus-       Hacker’s perspective.
tomer, everything is being nearly transacted via
web. Even from internal infrastructure perspec-      The independent testing firms with expertise in
tive companies are shifting to cloud, taking         niche skill domain can come in very handy in
SaaS model etc. to ease their operations and         making a service or product robust. With the
availability.                                        varied pool of talent and the right mix of ap-
                                                     proach the testing firms can provide the essen-
In all this dynamics the security becomes an         tial or fix the points where an application can
utmost factor to be considered. Looking at the       be toyed with.
delicacy of web security measures a firm is tak-
ing, independent testing firms came into the         Software Testing in Various Develop-
picture. This shift leaves firms vulnerable to       ment Methodologies
unexpected security threats. It is also collective
effort of the service providers, cloud service       Waterfall model has been in usage from some
providers to ensure security and integrity of an     time. Normally the flow in the model is as fol-
enterprise is maintained.                            lows:

Need of Independent Testing Firms                    System Feasibility → Requirement Analysis
                                                     → System Design → Coding and Unit Test-
The product or service in its inception is devel-    ing
oped keeping in view the expected results or
criteria which it is intended to be put to use.      In this phase, the actual coding is done for the
The user is also expected to use the applica-        various modules. Generally the coder himself
tion in a particular fashion but the case is al-     reviews the code and individually test the func-
ways not the same. Today with the advance-           tionality of each module.
ment and availability of technology the end
                                                     Integration and System Testing. In this
user is quite versatile and sometimes mischie-       phase, integration of all the modules in the sys-
vous in a manner of speaking.
                                                     tem is done and testing is done of the entire
The breach in security of web-site or as a mat-      system, making sure that the modules meet the
ter of fact any application/service can be inten-    requirements.
tional as well as non-intentional. As a provider
                                                     Deployment and maintenance. In this phase,
of service/product we can pray for the user to       the software is deployed in the production envi-
use it in the desired manner but one has to be       ronment. One can rectify any errors that are
prepared for the unexpected use also. While




http://www.360logica.com | info@360logica.com                                                         2
360logica Software Testing Company White Paper




identified in this phase, and tweak the function-   taking the manual approach to rectify the end
ality based on the updated requirements.            results. In this scenario the manual tester is
                                                    preferred who has the expertise over the re-
Agile Model                                         quired domain.
The key differences between agile and tradi-        Conclusion
tional methodologies are as follows:
                                                    With the advancement of more and more peo-
Software is developed in sprints or short con-
                                                    ple shifting to web based applications, which
tinuous cycles. The result is in chunks, small
                                                    definitely makes life and work easy one has to
releases, with each release adding up to previ-
                                                    take care of threats which comes with the
ous functionality. Each release is thoroughly
                                                    package.
tested, which ensures that all issues are ad-
dressed in the next process. In the end system      Threats are not just for the consumer but for
testing is done to ensure the complete security     the enterprises as well. Common threats can
as per the requirement.                             be like Web-based attacks, Social phishing,
                                                    Malicious data loss etc. One has to take care of
Manual vs. Automated Testing                        prevention mechanism rather than responsive
Manual testing though very useful for checking      mechanism.
the nuts and bolts of the code written but may
lack in scanning the entire module on a com-
prehensive note.

Automated testing, owing to its comprehensive
nature is quite good in identifying the threats
and when coupled with manual testing it can
prove to be very beneficial.

A code may be tested by various techniques
like SQL injection, code injection, remote code
inclusion and cross-site scripting; an auto-
mated tool can come in handy to automate
testing of these techniques but an experienced
tester can prove more valuable who along with
his “out of the box thinking” can test the appli-
cation by subjecting it to unexpected attacks.

The best practices would facilitate tweaking the
script of Automation tool (IBM Ad Scan, Peros,
QA inspect, etc.) depending upon the technical
requirement of the code to be tested and then




http://www.360logica.com | info@360logica.com                                                        3

Más contenido relacionado

Más de 360logica Software Testing Services (A Saksoft Company) (10)

The future of the capital markets industry
The future of the capital markets industryThe future of the capital markets industry
The future of the capital markets industry
 
Case Study : Manual & Automation Testing
Case Study : Manual & Automation TestingCase Study : Manual & Automation Testing
Case Study : Manual & Automation Testing
 
Case Study : Performance Testing (Educational Services)
Case Study : Performance Testing (Educational Services)Case Study : Performance Testing (Educational Services)
Case Study : Performance Testing (Educational Services)
 
Case study: Performance Testing using Load Runner
Case study: Performance Testing using Load RunnerCase study: Performance Testing using Load Runner
Case study: Performance Testing using Load Runner
 
Selenium php framework_case_study
Selenium php framework_case_studySelenium php framework_case_study
Selenium php framework_case_study
 
Software testing basics and its types
Software testing basics and its typesSoftware testing basics and its types
Software testing basics and its types
 
Software testing and analysis
Software testing and analysisSoftware testing and analysis
Software testing and analysis
 
Quality in Software Testing
Quality in Software TestingQuality in Software Testing
Quality in Software Testing
 
Software testing - An Overview
Software testing - An OverviewSoftware testing - An Overview
Software testing - An Overview
 
Software testing
Software testingSoftware testing
Software testing
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

security testing

  • 1. 360logica Software Testing Company White Paper A White Paper on Security Testing Updated: 24-03-2012 http://www.360logica.com | info@360logica.com
  • 2. 360logica Software Testing Company White Paper Introduction taking security measures one has to think from intentional perspectives as well. A person who Owing to the ever changing business dynam- has written a code himself can be at loss in ics, more and more organizations are shifting testing/verifying the code from the view point of to the web. This shift is not just customer cen- finding “loop holes”. One has to think from in- tric but internal as well. In terms of customer, tentional perspective or popularly ethical be it business to business or business to cus- Hacker’s perspective. tomer, everything is being nearly transacted via web. Even from internal infrastructure perspec- The independent testing firms with expertise in tive companies are shifting to cloud, taking niche skill domain can come in very handy in SaaS model etc. to ease their operations and making a service or product robust. With the availability. varied pool of talent and the right mix of ap- proach the testing firms can provide the essen- In all this dynamics the security becomes an tial or fix the points where an application can utmost factor to be considered. Looking at the be toyed with. delicacy of web security measures a firm is tak- ing, independent testing firms came into the Software Testing in Various Develop- picture. This shift leaves firms vulnerable to ment Methodologies unexpected security threats. It is also collective effort of the service providers, cloud service Waterfall model has been in usage from some providers to ensure security and integrity of an time. Normally the flow in the model is as fol- enterprise is maintained. lows: Need of Independent Testing Firms System Feasibility → Requirement Analysis → System Design → Coding and Unit Test- The product or service in its inception is devel- ing oped keeping in view the expected results or criteria which it is intended to be put to use. In this phase, the actual coding is done for the The user is also expected to use the applica- various modules. Generally the coder himself tion in a particular fashion but the case is al- reviews the code and individually test the func- ways not the same. Today with the advance- tionality of each module. ment and availability of technology the end Integration and System Testing. In this user is quite versatile and sometimes mischie- phase, integration of all the modules in the sys- vous in a manner of speaking. tem is done and testing is done of the entire The breach in security of web-site or as a mat- system, making sure that the modules meet the ter of fact any application/service can be inten- requirements. tional as well as non-intentional. As a provider Deployment and maintenance. In this phase, of service/product we can pray for the user to the software is deployed in the production envi- use it in the desired manner but one has to be ronment. One can rectify any errors that are prepared for the unexpected use also. While http://www.360logica.com | info@360logica.com 2
  • 3. 360logica Software Testing Company White Paper identified in this phase, and tweak the function- taking the manual approach to rectify the end ality based on the updated requirements. results. In this scenario the manual tester is preferred who has the expertise over the re- Agile Model quired domain. The key differences between agile and tradi- Conclusion tional methodologies are as follows: With the advancement of more and more peo- Software is developed in sprints or short con- ple shifting to web based applications, which tinuous cycles. The result is in chunks, small definitely makes life and work easy one has to releases, with each release adding up to previ- take care of threats which comes with the ous functionality. Each release is thoroughly package. tested, which ensures that all issues are ad- dressed in the next process. In the end system Threats are not just for the consumer but for testing is done to ensure the complete security the enterprises as well. Common threats can as per the requirement. be like Web-based attacks, Social phishing, Malicious data loss etc. One has to take care of Manual vs. Automated Testing prevention mechanism rather than responsive Manual testing though very useful for checking mechanism. the nuts and bolts of the code written but may lack in scanning the entire module on a com- prehensive note. Automated testing, owing to its comprehensive nature is quite good in identifying the threats and when coupled with manual testing it can prove to be very beneficial. A code may be tested by various techniques like SQL injection, code injection, remote code inclusion and cross-site scripting; an auto- mated tool can come in handy to automate testing of these techniques but an experienced tester can prove more valuable who along with his “out of the box thinking” can test the appli- cation by subjecting it to unexpected attacks. The best practices would facilitate tweaking the script of Automation tool (IBM Ad Scan, Peros, QA inspect, etc.) depending upon the technical requirement of the code to be tested and then http://www.360logica.com | info@360logica.com 3