SlideShare a Scribd company logo
1 of 3
Download to read offline
360logica Software Testing Company White Paper




                                                        A White Paper
                                                                    on
                                                      Security Testing




Updated: 24-03-2012

http://www.360logica.com | info@360logica.com
360logica Software Testing Company White Paper




Introduction                                         taking security measures one has to think from
                                                     intentional perspectives as well. A person who
Owing to the ever changing business dynam-           has written a code himself can be at loss in
ics, more and more organizations are shifting        testing/verifying the code from the view point of
to the web. This shift is not just customer cen-     finding “loop holes”. One has to think from in-
tric but internal as well. In terms of customer,     tentional perspective or popularly ethical
be it business to business or business to cus-       Hacker’s perspective.
tomer, everything is being nearly transacted via
web. Even from internal infrastructure perspec-      The independent testing firms with expertise in
tive companies are shifting to cloud, taking         niche skill domain can come in very handy in
SaaS model etc. to ease their operations and         making a service or product robust. With the
availability.                                        varied pool of talent and the right mix of ap-
                                                     proach the testing firms can provide the essen-
In all this dynamics the security becomes an         tial or fix the points where an application can
utmost factor to be considered. Looking at the       be toyed with.
delicacy of web security measures a firm is tak-
ing, independent testing firms came into the         Software Testing in Various Develop-
picture. This shift leaves firms vulnerable to       ment Methodologies
unexpected security threats. It is also collective
effort of the service providers, cloud service       Waterfall model has been in usage from some
providers to ensure security and integrity of an     time. Normally the flow in the model is as fol-
enterprise is maintained.                            lows:

Need of Independent Testing Firms                    System Feasibility → Requirement Analysis
                                                     → System Design → Coding and Unit Test-
The product or service in its inception is devel-    ing
oped keeping in view the expected results or
criteria which it is intended to be put to use.      In this phase, the actual coding is done for the
The user is also expected to use the applica-        various modules. Generally the coder himself
tion in a particular fashion but the case is al-     reviews the code and individually test the func-
ways not the same. Today with the advance-           tionality of each module.
ment and availability of technology the end
                                                     Integration and System Testing. In this
user is quite versatile and sometimes mischie-       phase, integration of all the modules in the sys-
vous in a manner of speaking.
                                                     tem is done and testing is done of the entire
The breach in security of web-site or as a mat-      system, making sure that the modules meet the
ter of fact any application/service can be inten-    requirements.
tional as well as non-intentional. As a provider
                                                     Deployment and maintenance. In this phase,
of service/product we can pray for the user to       the software is deployed in the production envi-
use it in the desired manner but one has to be       ronment. One can rectify any errors that are
prepared for the unexpected use also. While




http://www.360logica.com | info@360logica.com                                                         2
360logica Software Testing Company White Paper




identified in this phase, and tweak the function-   taking the manual approach to rectify the end
ality based on the updated requirements.            results. In this scenario the manual tester is
                                                    preferred who has the expertise over the re-
Agile Model                                         quired domain.
The key differences between agile and tradi-        Conclusion
tional methodologies are as follows:
                                                    With the advancement of more and more peo-
Software is developed in sprints or short con-
                                                    ple shifting to web based applications, which
tinuous cycles. The result is in chunks, small
                                                    definitely makes life and work easy one has to
releases, with each release adding up to previ-
                                                    take care of threats which comes with the
ous functionality. Each release is thoroughly
                                                    package.
tested, which ensures that all issues are ad-
dressed in the next process. In the end system      Threats are not just for the consumer but for
testing is done to ensure the complete security     the enterprises as well. Common threats can
as per the requirement.                             be like Web-based attacks, Social phishing,
                                                    Malicious data loss etc. One has to take care of
Manual vs. Automated Testing                        prevention mechanism rather than responsive
Manual testing though very useful for checking      mechanism.
the nuts and bolts of the code written but may
lack in scanning the entire module on a com-
prehensive note.

Automated testing, owing to its comprehensive
nature is quite good in identifying the threats
and when coupled with manual testing it can
prove to be very beneficial.

A code may be tested by various techniques
like SQL injection, code injection, remote code
inclusion and cross-site scripting; an auto-
mated tool can come in handy to automate
testing of these techniques but an experienced
tester can prove more valuable who along with
his “out of the box thinking” can test the appli-
cation by subjecting it to unexpected attacks.

The best practices would facilitate tweaking the
script of Automation tool (IBM Ad Scan, Peros,
QA inspect, etc.) depending upon the technical
requirement of the code to be tested and then




http://www.360logica.com | info@360logica.com                                                        3

More Related Content

More from 360logica Software Testing Services (A Saksoft Company)

More from 360logica Software Testing Services (A Saksoft Company) (10)

The future of the capital markets industry
The future of the capital markets industryThe future of the capital markets industry
The future of the capital markets industry
 
Case Study : Manual & Automation Testing
Case Study : Manual & Automation TestingCase Study : Manual & Automation Testing
Case Study : Manual & Automation Testing
 
Case Study : Performance Testing (Educational Services)
Case Study : Performance Testing (Educational Services)Case Study : Performance Testing (Educational Services)
Case Study : Performance Testing (Educational Services)
 
Case study: Performance Testing using Load Runner
Case study: Performance Testing using Load RunnerCase study: Performance Testing using Load Runner
Case study: Performance Testing using Load Runner
 
Selenium php framework_case_study
Selenium php framework_case_studySelenium php framework_case_study
Selenium php framework_case_study
 
Software testing basics and its types
Software testing basics and its typesSoftware testing basics and its types
Software testing basics and its types
 
Software testing and analysis
Software testing and analysisSoftware testing and analysis
Software testing and analysis
 
Quality in Software Testing
Quality in Software TestingQuality in Software Testing
Quality in Software Testing
 
Software testing - An Overview
Software testing - An OverviewSoftware testing - An Overview
Software testing - An Overview
 
Software testing
Software testingSoftware testing
Software testing
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

security testing

  • 1. 360logica Software Testing Company White Paper A White Paper on Security Testing Updated: 24-03-2012 http://www.360logica.com | info@360logica.com
  • 2. 360logica Software Testing Company White Paper Introduction taking security measures one has to think from intentional perspectives as well. A person who Owing to the ever changing business dynam- has written a code himself can be at loss in ics, more and more organizations are shifting testing/verifying the code from the view point of to the web. This shift is not just customer cen- finding “loop holes”. One has to think from in- tric but internal as well. In terms of customer, tentional perspective or popularly ethical be it business to business or business to cus- Hacker’s perspective. tomer, everything is being nearly transacted via web. Even from internal infrastructure perspec- The independent testing firms with expertise in tive companies are shifting to cloud, taking niche skill domain can come in very handy in SaaS model etc. to ease their operations and making a service or product robust. With the availability. varied pool of talent and the right mix of ap- proach the testing firms can provide the essen- In all this dynamics the security becomes an tial or fix the points where an application can utmost factor to be considered. Looking at the be toyed with. delicacy of web security measures a firm is tak- ing, independent testing firms came into the Software Testing in Various Develop- picture. This shift leaves firms vulnerable to ment Methodologies unexpected security threats. It is also collective effort of the service providers, cloud service Waterfall model has been in usage from some providers to ensure security and integrity of an time. Normally the flow in the model is as fol- enterprise is maintained. lows: Need of Independent Testing Firms System Feasibility → Requirement Analysis → System Design → Coding and Unit Test- The product or service in its inception is devel- ing oped keeping in view the expected results or criteria which it is intended to be put to use. In this phase, the actual coding is done for the The user is also expected to use the applica- various modules. Generally the coder himself tion in a particular fashion but the case is al- reviews the code and individually test the func- ways not the same. Today with the advance- tionality of each module. ment and availability of technology the end Integration and System Testing. In this user is quite versatile and sometimes mischie- phase, integration of all the modules in the sys- vous in a manner of speaking. tem is done and testing is done of the entire The breach in security of web-site or as a mat- system, making sure that the modules meet the ter of fact any application/service can be inten- requirements. tional as well as non-intentional. As a provider Deployment and maintenance. In this phase, of service/product we can pray for the user to the software is deployed in the production envi- use it in the desired manner but one has to be ronment. One can rectify any errors that are prepared for the unexpected use also. While http://www.360logica.com | info@360logica.com 2
  • 3. 360logica Software Testing Company White Paper identified in this phase, and tweak the function- taking the manual approach to rectify the end ality based on the updated requirements. results. In this scenario the manual tester is preferred who has the expertise over the re- Agile Model quired domain. The key differences between agile and tradi- Conclusion tional methodologies are as follows: With the advancement of more and more peo- Software is developed in sprints or short con- ple shifting to web based applications, which tinuous cycles. The result is in chunks, small definitely makes life and work easy one has to releases, with each release adding up to previ- take care of threats which comes with the ous functionality. Each release is thoroughly package. tested, which ensures that all issues are ad- dressed in the next process. In the end system Threats are not just for the consumer but for testing is done to ensure the complete security the enterprises as well. Common threats can as per the requirement. be like Web-based attacks, Social phishing, Malicious data loss etc. One has to take care of Manual vs. Automated Testing prevention mechanism rather than responsive Manual testing though very useful for checking mechanism. the nuts and bolts of the code written but may lack in scanning the entire module on a com- prehensive note. Automated testing, owing to its comprehensive nature is quite good in identifying the threats and when coupled with manual testing it can prove to be very beneficial. A code may be tested by various techniques like SQL injection, code injection, remote code inclusion and cross-site scripting; an auto- mated tool can come in handy to automate testing of these techniques but an experienced tester can prove more valuable who along with his “out of the box thinking” can test the appli- cation by subjecting it to unexpected attacks. The best practices would facilitate tweaking the script of Automation tool (IBM Ad Scan, Peros, QA inspect, etc.) depending upon the technical requirement of the code to be tested and then http://www.360logica.com | info@360logica.com 3