SlideShare a Scribd company logo
 5.1 The Basis of Security Testing
 5.2 Security Risks
 5.3 Information Security Policies and
Procedures
 5.4 Security Auditing and Its Role in Security
Testing
 Security testing is the process of to discover the weaknesses,
risks, or threats in the software application.
 It also us to stop the nasty attack from the outsiders and
make sure the security of our software applications.
 objective of security testing is to find all the potential
ambiguities and vulnerabilities of the application so that the
software does not stop working.
 it helps us to identify all the possible security threats and also
help the programmer to fix those errors.
 Availability
 In this, the data must be retained by an official
person, and they also guarantee that the data
and statement services will be ready to use
whenever we need it.
 Integrity
 In this, we will secure those data which have
been changed by the unofficial person. The
primary objective of integrity is to permit the
receiver to control the data that is given by the
system.
 Authorization
 It is the process of defining that a client is permitted to
perform an action and also receive the services. The
example of authorization is Access control.
 Confidentiality
 It is a security process that protracts the leak of the
data from the outsider's because it is the only way
where we can make sure the security of our data.
 Authentication
 The authentication process comprises confirming the
individuality of a person, tracing the source of a
product that is necessary to allow access to the
private information or the system.
 Non- repudiation
 It is used as a reference to the digital security,
and it a way of assurance that the sender of a
message cannot disagree with having sent the
message and that the recipient cannot
repudiate having received the message.
 The non-repudiation is used to ensure that a
conveyed message has been sent and
received by the person who claims to have
sent and received the message.
 We have various security testing tools
available in the market, which are as
follows:
 SonarQube
 ZAP
 Netsparker
 Arachni
 IronWASP
 A security risk assessment identifies,
assesses, and implements key security
controls in applications.
 It focuses on preventing application security
defects and vulnerabilities.
 Carrying out a risk assessment allows an
organization to view the application portfolio
holistically—from an attacker’s perspective.
 It supports managers in making informed
resource allocation, tooling, and security
control implementation decisions.
 Thus, conducting an assessment is an
integral part of an organization’s risk
 Identification. Determine all critical assets of
the technology infrastructure. Next, diagnose
sensitive data that is created, stored, or
transmitted by these assets. Create a risk
profile for each.
 Assessment. Administer an approach to
assess the identified security risks for critical
assets. After careful evaluation and
assessment, determine how to effectively
and efficiently allocate time and resources
towards risk mitigation. The assessment
approach or methodology must analyze the
correlation between assets, threats,
 Mitigation. Define a mitigation approach
and enforce security controls for each risk.
 Prevention. Implement tools and
processes to minimize threats and
vulnerabilities from occurring in your firm’s
resources.
 Identify assets (e.g., network, servers,
applications, data centers, tools, etc.) within
the organization.
 Create risk profiles for each asset.
 Understand what data is stored, transmitted,
and generated by these assets.
 Assess asset criticality regarding business
operations. This includes the overall impact
to revenue, reputation, and the likelihood of a
firm’s exploitation.
 Measure the risk ranking for assets and
prioritize them for assessment.
 Apply mitigating controls for each asset
 An information security policy (ISP) is a
set of rules, policies and procedures
designed to ensure all end users and
networks within an organization meet
minimum IT security and data protection
security requirements.
 ISPs should address all data, programs,
systems, facilities, infrastructure,
authorized users, third parties and fourth
parties of an organization.
 Establish a general approach to information security
 Document security measures and user access
control policies
 Detect and minimize the impact of compromised
information assets such as misuse of data, networks,
mobile devices, computers and applications
 Protect the reputation of the organization
 Comply with legal and regulatory requirements like
NIST, GDPR, HIPAA and FERPA
 Protect their customer's data, such as credit card
numbers
 Provide effective mechanisms to respond to
complaints and queries related to real or perceived
cyber security risks such
as phishing, malware and ransomware
 Limit access to key information technology assets to
 Confidentiality: data and information are
protected from unauthorized access
 Integrity: Data is intact, complete and
accurate
 Availability: IT systems are available
when needed
 A security audit is a systematic evaluation
of the security of a company's information
system by measuring how well it conforms
to an established set of criteria.
 This assessment measures your
information system’s security against
an audit checklist of industry best
practices, externally established
standards, and/or federal regulations
 Physical components of your information system
and the environment in which the information
system is housed.
 Applications and software, including security
patches your systems administrators, have
already implemented.
 Network vulnerabilities, including public and
private access and firewall configurations.
 The human dimension, including how employees
collect, share, and store highly sensitive
information.
 The organization’s overall security strategy,
including security policies, organization charts,
 A security audit compares your
organization’s actual IT practices with the
standards relevant to your enterprise and
will identify areas for remediation and
growth.
 Specifically, auditors will review security
controls for adequacy, validate compliance
with security policies, identify breaches,
and ultimately make recommendations to
address their findings.
 The audit will result in a report with
observations, recommended changes,
and other details about your security
program.
 The audit report may describe specific
security vulnerabilities or reveal previously
undiscovered security breaches.
 These findings can then be used to inform
your cybersecurity risk management
approach.
 A security audit will provide a roadmap of
your organization’s main information
security weaknesses and identify where it
is meeting the criteria the organization has
set out to follow and where it isn’t.
 Security audits are crucial to
developing risk assessment plans and
mitigation strategies for organizations
dealing with sensitive and confidential
data.
 Successful security audits should give
your team a snapshot of your
organization’s security posture at that
point in time and provide enough detail to
give your team a place to start with
remediation or improvement activities.
 Some security-centric audits may also
serve as formal compliance audits,
completed by a third-party audit team for
the purpose of certifying against ISO
 Security audits also provide your
organization with a different view of IT
security practices and strategy, whether
they are conducted by an internal audit
function or through an external audit.
 Having your organization’s security
policies scrutinized can provide valuable
insights into how to implement better
controls or streamline existing processes.
 Security audits are an important tool and
method for operating an up-to-date and
effective information security program.
 cybersecurity amplifies an organization’s
capability to respond to security threats.
 https://www.synopsys.com/glossary/what-
is-security-risk-assessment.html
 https://www.auditboard.com/blog/what-is-
security-audit/

More Related Content

What's hot

Software Testing 101
Software Testing 101Software Testing 101
Software Testing 101
QA Hannah
 
Software testing life cycle
Software testing life cycleSoftware testing life cycle
Software testing life cycle
Garuda Trainings
 
Manual Testing
Manual TestingManual Testing
Manual Testing
Zeeshan Khan
 
Chapter 4 - Mobile Application Platforms, Tools and Environment
Chapter 4 - Mobile Application Platforms, Tools and EnvironmentChapter 4 - Mobile Application Platforms, Tools and Environment
Chapter 4 - Mobile Application Platforms, Tools and Environment
Neeraj Kumar Singh
 
Stlc ppt
Stlc pptStlc ppt
Stlc ppt
Bhavik Modi
 
Software Testing Life Cycle – A Beginner’s Guide
Software Testing Life Cycle – A Beginner’s GuideSoftware Testing Life Cycle – A Beginner’s Guide
Software Testing Life Cycle – A Beginner’s Guide
Syed Hassan Raza
 
SOFTWARE TESTING
SOFTWARE TESTINGSOFTWARE TESTING
SOFTWARE TESTING
Priyanka Karancy
 
STLC (Software Testing Life Cycle)
STLC (Software Testing Life Cycle)STLC (Software Testing Life Cycle)
STLC (Software Testing Life Cycle)
Ch Fahadi
 
Software testing
Software testingSoftware testing
Software testing
ssusere50573
 
Software Testing Life Cycle
Software Testing Life CycleSoftware Testing Life Cycle
Software Testing Life CycleUdayakumar Sree
 
Software Testing Life Cycle (STLC) | Software Testing Tutorial | Edureka
Software Testing Life Cycle (STLC) | Software Testing Tutorial | EdurekaSoftware Testing Life Cycle (STLC) | Software Testing Tutorial | Edureka
Software Testing Life Cycle (STLC) | Software Testing Tutorial | Edureka
Edureka!
 
Testing concepts [3] - Software Testing Techniques (CIS640)
Testing concepts [3] - Software Testing Techniques (CIS640)Testing concepts [3] - Software Testing Techniques (CIS640)
Testing concepts [3] - Software Testing Techniques (CIS640)
Venkatesh Prasad Ranganath
 
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
Ankit Prajapati
 
Sdlc (software development life cycle)
Sdlc (software development life cycle)Sdlc (software development life cycle)
Sdlc (software development life cycle)
Nadeesha Thilakarathne
 
Software Testing
Software TestingSoftware Testing
Software Testing
Mousmi Pawar
 
Basic software-testing-concepts
Basic software-testing-conceptsBasic software-testing-concepts
Basic software-testing-conceptsmedsherb
 
TESTING LIFE CYCLE PPT
TESTING LIFE CYCLE PPTTESTING LIFE CYCLE PPT
TESTING LIFE CYCLE PPTsuhasreddy1
 

What's hot (20)

STLC
STLCSTLC
STLC
 
Software Testing 101
Software Testing 101Software Testing 101
Software Testing 101
 
Software testing life cycle
Software testing life cycleSoftware testing life cycle
Software testing life cycle
 
Manual Testing
Manual TestingManual Testing
Manual Testing
 
Chapter 4 - Mobile Application Platforms, Tools and Environment
Chapter 4 - Mobile Application Platforms, Tools and EnvironmentChapter 4 - Mobile Application Platforms, Tools and Environment
Chapter 4 - Mobile Application Platforms, Tools and Environment
 
Stlc ppt
Stlc pptStlc ppt
Stlc ppt
 
Software Testing Life Cycle – A Beginner’s Guide
Software Testing Life Cycle – A Beginner’s GuideSoftware Testing Life Cycle – A Beginner’s Guide
Software Testing Life Cycle – A Beginner’s Guide
 
SOFTWARE TESTING
SOFTWARE TESTINGSOFTWARE TESTING
SOFTWARE TESTING
 
STLC (Software Testing Life Cycle)
STLC (Software Testing Life Cycle)STLC (Software Testing Life Cycle)
STLC (Software Testing Life Cycle)
 
Manual testing ppt
Manual testing pptManual testing ppt
Manual testing ppt
 
Software testing
Software testingSoftware testing
Software testing
 
Software Testing Life Cycle
Software Testing Life CycleSoftware Testing Life Cycle
Software Testing Life Cycle
 
Software Testing Life Cycle (STLC) | Software Testing Tutorial | Edureka
Software Testing Life Cycle (STLC) | Software Testing Tutorial | EdurekaSoftware Testing Life Cycle (STLC) | Software Testing Tutorial | Edureka
Software Testing Life Cycle (STLC) | Software Testing Tutorial | Edureka
 
Testing concepts [3] - Software Testing Techniques (CIS640)
Testing concepts [3] - Software Testing Techniques (CIS640)Testing concepts [3] - Software Testing Techniques (CIS640)
Testing concepts [3] - Software Testing Techniques (CIS640)
 
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
 
Softwaretesting
SoftwaretestingSoftwaretesting
Softwaretesting
 
Sdlc (software development life cycle)
Sdlc (software development life cycle)Sdlc (software development life cycle)
Sdlc (software development life cycle)
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Basic software-testing-concepts
Basic software-testing-conceptsBasic software-testing-concepts
Basic software-testing-concepts
 
TESTING LIFE CYCLE PPT
TESTING LIFE CYCLE PPTTESTING LIFE CYCLE PPT
TESTING LIFE CYCLE PPT
 

Similar to SDET UNIT 5.pptx

17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdfCyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Security Experts
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
Piyush Jain
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
Vskills
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
Vulnerability Assessment and Penetration Testing (VAPT).pdf
Vulnerability Assessment and Penetration Testing (VAPT).pdfVulnerability Assessment and Penetration Testing (VAPT).pdf
Vulnerability Assessment and Penetration Testing (VAPT).pdf
Cyber Security Experts
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 
Exploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity TestingExploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity Testing
jatniwalafizza786
 
Best Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxBest Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docx
Afour tech
 
What to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration TestWhat to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration Test
ShyamMishra72
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
cejobelle
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec SysMicheal Isreal
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
phanleson
 
The Process of Conducting a Cyber Security Audit.pdf
The Process of Conducting a Cyber Security Audit.pdfThe Process of Conducting a Cyber Security Audit.pdf
The Process of Conducting a Cyber Security Audit.pdf
Cyber Security Experts
 
ISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochureISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochure
Thilak Pathirage -Senior IT Gov and Risk Consultant
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Fameworklneut03
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
Priyanka Aash
 

Similar to SDET UNIT 5.pptx (20)

17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdfCyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Vulnerability Assessment and Penetration Testing (VAPT).pdf
Vulnerability Assessment and Penetration Testing (VAPT).pdfVulnerability Assessment and Penetration Testing (VAPT).pdf
Vulnerability Assessment and Penetration Testing (VAPT).pdf
 
Security testing
Security testingSecurity testing
Security testing
 
Exploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity TestingExploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity Testing
 
Best Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxBest Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docx
 
What to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration TestWhat to Expect During a Vulnerability Assessment and Penetration Test
What to Expect During a Vulnerability Assessment and Penetration Test
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
The Process of Conducting a Cyber Security Audit.pdf
The Process of Conducting a Cyber Security Audit.pdfThe Process of Conducting a Cyber Security Audit.pdf
The Process of Conducting a Cyber Security Audit.pdf
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
ISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochureISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochure
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 

More from PallawiBulakh1

RM UNIT 6.pptx
RM UNIT 6.pptxRM UNIT 6.pptx
RM UNIT 6.pptx
PallawiBulakh1
 
RM UNIT 5.pptx
RM UNIT 5.pptxRM UNIT 5.pptx
RM UNIT 5.pptx
PallawiBulakh1
 
Research Methodology UNIT 4.pptx
Research Methodology UNIT 4.pptxResearch Methodology UNIT 4.pptx
Research Methodology UNIT 4.pptx
PallawiBulakh1
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
PallawiBulakh1
 
Research Methodology UNIT 2.pptx
Research Methodology UNIT 2.pptxResearch Methodology UNIT 2.pptx
Research Methodology UNIT 2.pptx
PallawiBulakh1
 
Research Methodology UNIT 1.pptx
Research Methodology UNIT 1.pptxResearch Methodology UNIT 1.pptx
Research Methodology UNIT 1.pptx
PallawiBulakh1
 
Msword module 3
Msword  module 3Msword  module 3
Msword module 3
PallawiBulakh1
 
Ms word module 2
Ms word  module 2Ms word  module 2
Ms word module 2
PallawiBulakh1
 
Introduction to web technology
Introduction to web technologyIntroduction to web technology
Introduction to web technology
PallawiBulakh1
 
Ms word module 1
Ms word module 1Ms word module 1
Ms word module 1
PallawiBulakh1
 
How to write and publish good quality research paper
How to write and publish good quality research paperHow to write and publish good quality research paper
How to write and publish good quality research paper
PallawiBulakh1
 

More from PallawiBulakh1 (12)

ch13.ppt
ch13.pptch13.ppt
ch13.ppt
 
RM UNIT 6.pptx
RM UNIT 6.pptxRM UNIT 6.pptx
RM UNIT 6.pptx
 
RM UNIT 5.pptx
RM UNIT 5.pptxRM UNIT 5.pptx
RM UNIT 5.pptx
 
Research Methodology UNIT 4.pptx
Research Methodology UNIT 4.pptxResearch Methodology UNIT 4.pptx
Research Methodology UNIT 4.pptx
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
Research Methodology UNIT 2.pptx
Research Methodology UNIT 2.pptxResearch Methodology UNIT 2.pptx
Research Methodology UNIT 2.pptx
 
Research Methodology UNIT 1.pptx
Research Methodology UNIT 1.pptxResearch Methodology UNIT 1.pptx
Research Methodology UNIT 1.pptx
 
Msword module 3
Msword  module 3Msword  module 3
Msword module 3
 
Ms word module 2
Ms word  module 2Ms word  module 2
Ms word module 2
 
Introduction to web technology
Introduction to web technologyIntroduction to web technology
Introduction to web technology
 
Ms word module 1
Ms word module 1Ms word module 1
Ms word module 1
 
How to write and publish good quality research paper
How to write and publish good quality research paperHow to write and publish good quality research paper
How to write and publish good quality research paper
 

Recently uploaded

Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 

Recently uploaded (20)

Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 

SDET UNIT 5.pptx

  • 1.
  • 2.  5.1 The Basis of Security Testing  5.2 Security Risks  5.3 Information Security Policies and Procedures  5.4 Security Auditing and Its Role in Security Testing
  • 3.  Security testing is the process of to discover the weaknesses, risks, or threats in the software application.  It also us to stop the nasty attack from the outsiders and make sure the security of our software applications.  objective of security testing is to find all the potential ambiguities and vulnerabilities of the application so that the software does not stop working.  it helps us to identify all the possible security threats and also help the programmer to fix those errors.
  • 4.
  • 5.  Availability  In this, the data must be retained by an official person, and they also guarantee that the data and statement services will be ready to use whenever we need it.  Integrity  In this, we will secure those data which have been changed by the unofficial person. The primary objective of integrity is to permit the receiver to control the data that is given by the system.
  • 6.  Authorization  It is the process of defining that a client is permitted to perform an action and also receive the services. The example of authorization is Access control.  Confidentiality  It is a security process that protracts the leak of the data from the outsider's because it is the only way where we can make sure the security of our data.  Authentication  The authentication process comprises confirming the individuality of a person, tracing the source of a product that is necessary to allow access to the private information or the system.
  • 7.  Non- repudiation  It is used as a reference to the digital security, and it a way of assurance that the sender of a message cannot disagree with having sent the message and that the recipient cannot repudiate having received the message.  The non-repudiation is used to ensure that a conveyed message has been sent and received by the person who claims to have sent and received the message.
  • 8.
  • 9.
  • 10.  We have various security testing tools available in the market, which are as follows:  SonarQube  ZAP  Netsparker  Arachni  IronWASP
  • 11.  A security risk assessment identifies, assesses, and implements key security controls in applications.  It focuses on preventing application security defects and vulnerabilities.  Carrying out a risk assessment allows an organization to view the application portfolio holistically—from an attacker’s perspective.  It supports managers in making informed resource allocation, tooling, and security control implementation decisions.  Thus, conducting an assessment is an integral part of an organization’s risk
  • 12.  Identification. Determine all critical assets of the technology infrastructure. Next, diagnose sensitive data that is created, stored, or transmitted by these assets. Create a risk profile for each.  Assessment. Administer an approach to assess the identified security risks for critical assets. After careful evaluation and assessment, determine how to effectively and efficiently allocate time and resources towards risk mitigation. The assessment approach or methodology must analyze the correlation between assets, threats,
  • 13.  Mitigation. Define a mitigation approach and enforce security controls for each risk.  Prevention. Implement tools and processes to minimize threats and vulnerabilities from occurring in your firm’s resources.
  • 14.  Identify assets (e.g., network, servers, applications, data centers, tools, etc.) within the organization.  Create risk profiles for each asset.  Understand what data is stored, transmitted, and generated by these assets.  Assess asset criticality regarding business operations. This includes the overall impact to revenue, reputation, and the likelihood of a firm’s exploitation.  Measure the risk ranking for assets and prioritize them for assessment.  Apply mitigating controls for each asset
  • 15.  An information security policy (ISP) is a set of rules, policies and procedures designed to ensure all end users and networks within an organization meet minimum IT security and data protection security requirements.  ISPs should address all data, programs, systems, facilities, infrastructure, authorized users, third parties and fourth parties of an organization.
  • 16.  Establish a general approach to information security  Document security measures and user access control policies  Detect and minimize the impact of compromised information assets such as misuse of data, networks, mobile devices, computers and applications  Protect the reputation of the organization  Comply with legal and regulatory requirements like NIST, GDPR, HIPAA and FERPA  Protect their customer's data, such as credit card numbers  Provide effective mechanisms to respond to complaints and queries related to real or perceived cyber security risks such as phishing, malware and ransomware  Limit access to key information technology assets to
  • 17.  Confidentiality: data and information are protected from unauthorized access  Integrity: Data is intact, complete and accurate  Availability: IT systems are available when needed
  • 18.  A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.  This assessment measures your information system’s security against an audit checklist of industry best practices, externally established standards, and/or federal regulations
  • 19.  Physical components of your information system and the environment in which the information system is housed.  Applications and software, including security patches your systems administrators, have already implemented.  Network vulnerabilities, including public and private access and firewall configurations.  The human dimension, including how employees collect, share, and store highly sensitive information.  The organization’s overall security strategy, including security policies, organization charts,
  • 20.  A security audit compares your organization’s actual IT practices with the standards relevant to your enterprise and will identify areas for remediation and growth.  Specifically, auditors will review security controls for adequacy, validate compliance with security policies, identify breaches, and ultimately make recommendations to address their findings.
  • 21.  The audit will result in a report with observations, recommended changes, and other details about your security program.  The audit report may describe specific security vulnerabilities or reveal previously undiscovered security breaches.  These findings can then be used to inform your cybersecurity risk management approach.
  • 22.  A security audit will provide a roadmap of your organization’s main information security weaknesses and identify where it is meeting the criteria the organization has set out to follow and where it isn’t.  Security audits are crucial to developing risk assessment plans and mitigation strategies for organizations dealing with sensitive and confidential data.
  • 23.  Successful security audits should give your team a snapshot of your organization’s security posture at that point in time and provide enough detail to give your team a place to start with remediation or improvement activities.  Some security-centric audits may also serve as formal compliance audits, completed by a third-party audit team for the purpose of certifying against ISO
  • 24.  Security audits also provide your organization with a different view of IT security practices and strategy, whether they are conducted by an internal audit function or through an external audit.  Having your organization’s security policies scrutinized can provide valuable insights into how to implement better controls or streamline existing processes.
  • 25.  Security audits are an important tool and method for operating an up-to-date and effective information security program.  cybersecurity amplifies an organization’s capability to respond to security threats.