Software testing tutorial security testing

Page 1

Software Testing Tutorial: Security Testing Before going in for a software testing course in Pune, you can go through our testing related articles. This would help you to know the basics of software testing. That in turn will help you to better understand the topics taught in the software testing classes in Pune. In today's article we are going to see the concept called security testing. It is an important concept and every tester should be acquainted with it. What do you mean by security testing? Security Testing is a part of Software Testing which guarantees, that the various systems and applications in a company, are free from any loose ends that may bring about a major penetration. Security testing of any system is about discovering every single loophole proviso and shortcomings of the system which may result into lost data because of the employees or outsiders of the organization. The major objective of security testing is to extract the threats in the system and measure its likely vulnerabilities. It additionally helps in recognizing all conceivable security breaches in the system and help the development team in settling these issues through coding. Illustrative checkpoints for Security Testing: Here are a few illustrative scenarios to give you a fair bit of idea about the security test cases.    

Verify session and cookies time for application. For finance related sites, Browser back button ought not work. Password ought to be encrypted. System or application ought not permit invalid users.

Security Testing types: Security testing is divided into seven major types. They happen to be as follows: - Vulnerability scanning - Security scanning - Penetration testing - Risk Assessment - Security Auditing - Posture Assessment and - Ethical hacking  

Vulnerability Scanning: This is carried out through automation to filter a software against existing vulnerability signatures. Security Scanning: It includes finding of system and network related vulnerabilities, and later give solutions for decreasing these risks. This checking can be performed for both Manual and Automated testing.


    

Penetration testing: This type of testing reenacts an attack from a malevolent hacker. This testing includes investigation of a specific system to check for potential vulnerabilities to an outer hacking endeavor. Risk Assessment:This type of testing includes investigation of security risks seen in the organization. Risks are assigned as Low, Medium and High based on its priority. This testing prescribes controls and measures to lessen the risk. Security Auditing: This is an internal review of Applications and Operating systems for security blemishes. Review or an audit should likewise be possible by means of line by line examination of the code. Ethical hacking: It's hacking an Organization Software systems. Not at all like malicious hackers,who penetrate a system for their own gains , the plan is to uncover security imperfections in the system. Posture Assessment: This consolidates Security scanning, Ethical Hacking and Risk Assessments to demonstrate a general security stance of an organization.

Security testing methodologies: In security testing, diverse methodologies are in practice, and they are as below: Tiger Box: This hacking is typically done on a laptop which has an accumulation of OSs and hacking tools. This testing assists penetration testers and security testers to perform vulnerabilities assessment and attacks. Black Box: Tester is approved to do testing on everything related to the network topology and the innovation. Grey Box: Partial data is given to the tester about the system, and it is a blend of white and black box models. To conclude: Security testing is most imperative testing for an application and checks whether confidential information remains private. In this type of testing, tester assumes a part of the hacker and plays around the system to discover security related loopholes. Thus, security testing is vital in IT industry to ensure data protection in all possible ways. A software testing institute in Pune, is the best place to learn more about Security Testing.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.