SlideShare a Scribd company logo
1 of 3
Download to read offline
WHITE PAPER ON
                           SECURITY TESTING




http://www.360logica.com
info@360logica.com                      White Paper
360LOGICA SOFTWARE TESTING COMPANY                                                                                { WHITE PAPER ON SECURITY TESTING }




                                                                                            Introduction
                                                                                             Owing to the ever changing business dynamics more and more or-
                                                                                             ganizations are shifting to the web. This shift is not just customer
                                                                                             centric but internal as well. In terms of customer, be it business to
                                                                                             business or business to customer everything is being nearly trans-
                                                                                             acted via web. Even from internal infrastructure perspective compa-
                                                                                             nies are shifting to cloud, taking SaaS model etc to ease their opera-
                                                                                             tions and availability. In all this dynamics the security becomes an
                                                                                             utmost factor to be considered. Looking at the delicacy of web secu-
                                                                                             rity measures a firm is taking, independent testing firms came into the
                                                                                             picture. This shift leaves firms vulnerable to unexpected security
                                                                                             threats. It is also collective effort of the service providers, cloud ser-
                                                                                             vice providers to ensure security and integrity of an enterprise is
                                                                                             maintained.




       Need of INDEPENDENT Testing Firms
                                                                                           Software Testing in Various development methodologies




     The product or service in its inception is developed keeping in view the expected       Waterfall model has been in quite usage from some time. Nor-
     the results or criteria which it is intended to be put to use. The user is also ex-     mally the flow in the model is as follows:
     pected to use the application in a particular fashion but the case is always not
     the same. Today with the advancement and availability of technology the end             • System feasibility -> Requirement analysis -> System design ->
     user is quite versatile and sometimes mischievous in a manner of speaking.              Coding and unit testing. In this phase, the actual coding is done for the
                                                                                             various modules. Generally the coder himself reviews the code and
     The breach in security of web-site or as a matter of fact any application/service       individually test the functionality of each module -> Integration and
     can be intentional as well as non-intentional. As a provider of service/product we      system testing. In this phase, integration of all the modules in the
     can pray for the user to use it in the desired manner but one has to be prepared        system is done and testing is done of the entire system, making sure
     for the unexpected use also. While taking security measures one has to think            that the modules meet the requirements. -> Deployment and mainte-
     from intentional perspectives as well. A person who has written a code himself          nance. In this phase, the software is deployed in the production envi-
     can be at loss in testing/verifying the code from the view point of finding “loop       ronment. One can rectify any errors that are identified in this phase,
     holes”. One has to think from intentional perspective or popularly ethical              and tweak the functionality based on the updated requirements.
     Hacker’s perspective.

     The independent testing firms with expertise in niche skill domain can come in
     very handy in making a service or product robust. With the varied pool of talent
     and the right mix of approach the testing firms can provide the essential or fix
     the points where an application can be toyed with.




http://www.360logica.com
info@360logica.com                                                                                                                                      White Paper
360LOGICA SOFTWARE TESTING COMPANY                                                                              { WHITE PAPER ON SECURITY TESTING }




                                                                                       Manual vs Automated testing

                                                                                       Manual testing though very useful for checking the nuts and bolts of the
                                                                                       code written but may lack in scanning the entire module on a comprehen-
                                                                                       sive note.

                                                                                       Automated testing owing to its comprehensive nature is quite good in
                                                                                       identifying the threats and when coupled with manual testing it can prove
                                                                                       to be very beneficial.
                                                                                       A code may be tested by various techniques like SQL injection, code
                                                                                       injection, remote code inclusion and cross-site scripting, an automated
                                                                                       tool can come in handy to automate testing of these techniques but an
                                                                                       experienced tester can prove more valuable who along with his “out of the
                                                                                       box thinking” can test the application by subjecting it to unexpected at-
                                                                                       tacks.

                                                                                       The best practices would facilitate tweaking the script of Automation tool
                                                                                       (IBM Ad Scan, Peros, QA inspect etc) depending upon the technical
                                                                                       requirement of the code to be tested and then taking the manual ap-
                                                                                       proach to rectify the end results. In this scenario the manual tester is
                                                                                       preferred who has the expertise over the required domain.




       Conclusion
       With the advancement of more and more people shifting to web based appli-
       cations, which definitely makes life and work easy one has to take care of
       threats which comes with the package.

       Threats are not just for the consumer but for the enterprises as well. Common
       threats can be like Web-based attacks, Social phishing, Malicious data loss
       etc. One has to take care of prevention mechanism rather responsive
       mechanism.




http://www.360logica.com
info@360logica.com                                                                                                                                   White Paper

More Related Content

More from 360logica Software Testing Services (A Saksoft Company) (10)

The future of the capital markets industry
The future of the capital markets industryThe future of the capital markets industry
The future of the capital markets industry
 
Case Study : Manual & Automation Testing
Case Study : Manual & Automation TestingCase Study : Manual & Automation Testing
Case Study : Manual & Automation Testing
 
Case Study : Performance Testing (Educational Services)
Case Study : Performance Testing (Educational Services)Case Study : Performance Testing (Educational Services)
Case Study : Performance Testing (Educational Services)
 
Case study: Performance Testing using Load Runner
Case study: Performance Testing using Load RunnerCase study: Performance Testing using Load Runner
Case study: Performance Testing using Load Runner
 
Selenium php framework_case_study
Selenium php framework_case_studySelenium php framework_case_study
Selenium php framework_case_study
 
Software testing basics and its types
Software testing basics and its typesSoftware testing basics and its types
Software testing basics and its types
 
Software testing and analysis
Software testing and analysisSoftware testing and analysis
Software testing and analysis
 
Quality in Software Testing
Quality in Software TestingQuality in Software Testing
Quality in Software Testing
 
Software testing - An Overview
Software testing - An OverviewSoftware testing - An Overview
Software testing - An Overview
 
Software testing
Software testingSoftware testing
Software testing
 

Recently uploaded

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

White paper security_testing

  • 1. WHITE PAPER ON SECURITY TESTING http://www.360logica.com info@360logica.com White Paper
  • 2. 360LOGICA SOFTWARE TESTING COMPANY { WHITE PAPER ON SECURITY TESTING } Introduction Owing to the ever changing business dynamics more and more or- ganizations are shifting to the web. This shift is not just customer centric but internal as well. In terms of customer, be it business to business or business to customer everything is being nearly trans- acted via web. Even from internal infrastructure perspective compa- nies are shifting to cloud, taking SaaS model etc to ease their opera- tions and availability. In all this dynamics the security becomes an utmost factor to be considered. Looking at the delicacy of web secu- rity measures a firm is taking, independent testing firms came into the picture. This shift leaves firms vulnerable to unexpected security threats. It is also collective effort of the service providers, cloud ser- vice providers to ensure security and integrity of an enterprise is maintained. Need of INDEPENDENT Testing Firms Software Testing in Various development methodologies The product or service in its inception is developed keeping in view the expected Waterfall model has been in quite usage from some time. Nor- the results or criteria which it is intended to be put to use. The user is also ex- mally the flow in the model is as follows: pected to use the application in a particular fashion but the case is always not the same. Today with the advancement and availability of technology the end • System feasibility -> Requirement analysis -> System design -> user is quite versatile and sometimes mischievous in a manner of speaking. Coding and unit testing. In this phase, the actual coding is done for the various modules. Generally the coder himself reviews the code and The breach in security of web-site or as a matter of fact any application/service individually test the functionality of each module -> Integration and can be intentional as well as non-intentional. As a provider of service/product we system testing. In this phase, integration of all the modules in the can pray for the user to use it in the desired manner but one has to be prepared system is done and testing is done of the entire system, making sure for the unexpected use also. While taking security measures one has to think that the modules meet the requirements. -> Deployment and mainte- from intentional perspectives as well. A person who has written a code himself nance. In this phase, the software is deployed in the production envi- can be at loss in testing/verifying the code from the view point of finding “loop ronment. One can rectify any errors that are identified in this phase, holes”. One has to think from intentional perspective or popularly ethical and tweak the functionality based on the updated requirements. Hacker’s perspective. The independent testing firms with expertise in niche skill domain can come in very handy in making a service or product robust. With the varied pool of talent and the right mix of approach the testing firms can provide the essential or fix the points where an application can be toyed with. http://www.360logica.com info@360logica.com White Paper
  • 3. 360LOGICA SOFTWARE TESTING COMPANY { WHITE PAPER ON SECURITY TESTING } Manual vs Automated testing Manual testing though very useful for checking the nuts and bolts of the code written but may lack in scanning the entire module on a comprehen- sive note. Automated testing owing to its comprehensive nature is quite good in identifying the threats and when coupled with manual testing it can prove to be very beneficial. A code may be tested by various techniques like SQL injection, code injection, remote code inclusion and cross-site scripting, an automated tool can come in handy to automate testing of these techniques but an experienced tester can prove more valuable who along with his “out of the box thinking” can test the application by subjecting it to unexpected at- tacks. The best practices would facilitate tweaking the script of Automation tool (IBM Ad Scan, Peros, QA inspect etc) depending upon the technical requirement of the code to be tested and then taking the manual ap- proach to rectify the end results. In this scenario the manual tester is preferred who has the expertise over the required domain. Conclusion With the advancement of more and more people shifting to web based appli- cations, which definitely makes life and work easy one has to take care of threats which comes with the package. Threats are not just for the consumer but for the enterprises as well. Common threats can be like Web-based attacks, Social phishing, Malicious data loss etc. One has to take care of prevention mechanism rather responsive mechanism. http://www.360logica.com info@360logica.com White Paper