Klooster, 2016 - Google Patents
Applying a Security Testing Methodology: a Case StudyKlooster, 2016
View PDF- Document ID
- 7384655750879177323
- Author
- Klooster K
- Publication year
External Links
Snippet
Security testing is a software testing discipline that aims to verify that the functionality of the software is resistant to attacks and data processed by the software is protected. To establish common requirements that the software must fulfill, software security standards are …
- 238000000034 method 0 title abstract description 51
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3688—Test management for test execution, e.g. scheduling of test suites
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Stuttard et al. | The web application hacker's handbook: Finding and exploiting security flaws | |
Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
Van Acker et al. | Password meters and generators on the web: From large-scale empirical study to getting it right | |
Rocchetto et al. | Model-based detection of CSRF | |
Katkar Anjali et al. | Web vulnerability detection and security mechanism | |
Zaidan et al. | Website vulnerability analysis of AB and XY office in East Java | |
Tkachenko et al. | Enhancing Front‐End Security: Protecting User Data and Privacy in Web Applications | |
Lepofsky | The manager's guide to web application security: a concise guide to the weaker side of the web | |
Jovičić et al. | Common web application attack types and security using asp. net | |
Čović | Threats and Vulnerabilities in Web Applications and How to Avoid Them | |
Gautam et al. | Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers | |
Klooster | Applying a Security Testing Methodology: a Case Study | |
MEHARU | WEB SECURITY VULNERABILITY ANALYSIS IN SELECTED ETHIOPIAN GOVERNMENTAL OFFICES (USING WHITE BOX AND BLACK BOX TESTING) | |
Kothawade et al. | Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment. | |
Szczepanik et al. | Security of mobile banking applications | |
Riesch et al. | Audit based privacy preservation for the OpenID authentication protocol | |
Lehtola et al. | Security, privacy, and legislation adherence assessment of a whistleblowing web application | |
Adams et al. | Guide to Securing Scientific Software | |
Shah et al. | Efficient solution for NoSQL database security in blockchain-based applications | |
Daka | Strengthening web application security through technical measures. | |
Nadal Rivero | Improvement of security measures of a medical data management platform | |
Adrian et al. | Security Audit and Analysis of High School Websites Using Cross Site Scripting (XSS) Method and Insecure Direct Object Reference (IDOR) Penetration Test | |
Bays et al. | FIC Vulnerability Profile | |
Lepofsky | Web Application Vulnerabilities and Countermeasures | |
Zatar et al. | Security Analysis in IoT Network APIs An Analytical Study of Vulnerabilities, Attack And Protection Techniques |