Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. PS Faculty: Mr.Gyanan
  2. 2. A Brief Introduction Of VERISIGN: VeriSign Inc (NASDAQ:VRSN) was founded in 1995 as a spin of RSA Security certification service business. The company served as a Certificate authority (CA) and its initial mission was providing trust for the Internet and Electronic Commerce through Digital Authentication services and products and to enable and protect all forms of interactions on voice and Data Networks. Everyday around 18 billion internet interactions are processed and over 100 million phone calls are supported. They also provide services that help over 3000 enterprises and 500000 Web sites to operate securely, reliably and efficiently.
  3. 3. IDefense security intelligence services VeriSign iDefense Security Intelligence Services gives information security executives 24/7 access to accurate and actionable cyber intelligence related to vulnerabilities, malicious code, and global threats. With VeriSign iDefense, organizations have an experienced multinational network of security experts acting as an extension of their teams and exclusive access to the most in-depth cyber threat intelligence available. This translates into a security strategy that consistently delivers substantial cost savings with proactive insights on true threats, the intelligence to avoid false alarms and revenue protection through improved system and application availability.
  4. 4. Mission of IDefense The mission of VeriSign iDefense intelligence research is to collect, analyze and package intelligence of importance in order to provide security practitioners with situational awareness and mitigation strategies pertaining to enterprise threats. The VeriSign iDefense global intelligence network includes hundreds of vulnerability researchers around the globe; a dedicated cyber intelligence team conducting threat research in more than 20 spoken languages and ongoing field operations in suspect regions of the world - all providing insight into the cyber underground, undiscovered vulnerabilities and global threats.
  5. 5. Methodology VeriSign iDefense Security Intelligence Services deliver timely, proactive intelligence using a proven methodology for discovery and analysis. The existence of vulnerability does not always pose a threat to the enterprise. With finite resources and more organized attackers, defense of critical IT assets requires security intelligence – knowing which threats pose the greatest risk to an organization’s infrastructure and business goals or mission.
  6. 6. Process flow of IDefense Security Intelligence
  7. 7. Software Development MethodologyThe development methodology used in idefense is Agile Software Development Methodology.Definition: Agile software development is a conceptual framework for software engineering that promotes development iterations throughout the life cycle of the project. Agile development methodology attempts to provide many opportunities to assess the direction of a project throughout the development lifecycle.
  8. 8. Scrum Methodology Scrum is a process of implementing Agile, where features aredelivered in30days sprints also known as iterations.Roles of ScrumScrum has three fundamental roles:1. Product Owner2. ScrumMaster and 3.Team member.
  9. 9. Agile SDLC chart.
  10. 10. TESTING PROCESS A primary purpose of testing is to detect software failures so that defects may be discovered and corrected.• Manual Testing• Automation TestingComparison of Manual and Automation Testing:
  11. 11. Automation Testing Code-driven testing: The public (usually) interfaces to classes, modules or libraries are tested with a variety of input arguments to validate that the results that are returned are correct. Graphical user interface testing: A testing framework generates user interface events such as keystrokes and mouse clicks, and observes the changes that result in the user interface, to validate that the observable behavior of the program is correct.