[go: up one dir, main page]

Klooster, 2016 - Google Patents

Applying a Security Testing Methodology: a Case Study

Klooster, 2016

View PDF
Document ID
7384655750879177323
Author
Klooster K
Publication year

External Links

Snippet

Security testing is a software testing discipline that aims to verify that the functionality of the software is resistant to attacks and data processed by the software is protected. To establish common requirements that the software must fulfill, software security standards are …
Continue reading at core.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Stuttard et al. The web application hacker's handbook: Finding and exploiting security flaws
Ravindran et al. A Review on Web Application Vulnerability Assessment and Penetration Testing.
Van Acker et al. Password meters and generators on the web: From large-scale empirical study to getting it right
Rocchetto et al. Model-based detection of CSRF
Katkar Anjali et al. Web vulnerability detection and security mechanism
Zaidan et al. Website vulnerability analysis of AB and XY office in East Java
Tkachenko et al. Enhancing Front‐End Security: Protecting User Data and Privacy in Web Applications
Lepofsky The manager's guide to web application security: a concise guide to the weaker side of the web
Jovičić et al. Common web application attack types and security using asp. net
Čović Threats and Vulnerabilities in Web Applications and How to Avoid Them
Gautam et al. Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers
Klooster Applying a Security Testing Methodology: a Case Study
MEHARU WEB SECURITY VULNERABILITY ANALYSIS IN SELECTED ETHIOPIAN GOVERNMENTAL OFFICES (USING WHITE BOX AND BLACK BOX TESTING)
Kothawade et al. Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment.
Szczepanik et al. Security of mobile banking applications
Riesch et al. Audit based privacy preservation for the OpenID authentication protocol
Lehtola et al. Security, privacy, and legislation adherence assessment of a whistleblowing web application
Adams et al. Guide to Securing Scientific Software
Shah et al. Efficient solution for NoSQL database security in blockchain-based applications
Daka Strengthening web application security through technical measures.
Nadal Rivero Improvement of security measures of a medical data management platform
Adrian et al. Security Audit and Analysis of High School Websites Using Cross Site Scripting (XSS) Method and Insecure Direct Object Reference (IDOR) Penetration Test
Bays et al. FIC Vulnerability Profile
Lepofsky Web Application Vulnerabilities and Countermeasures
Zatar et al. Security Analysis in IoT Network APIs An Analytical Study of Vulnerabilities, Attack And Protection Techniques