White Paper On Security Testing
White Paper On Security Testing
http://www.360logica.com [email protected]
White Paper
Introduction
Owing to the ever changing business dynamics more and more organizations are shifting to the web. This shift is not just customer centric but internal as well. In terms of customer, be it business to business or business to customer everything is being nearly transacted via web. Even from internal infrastructure perspective companies are shifting to cloud, taking SaaS model etc to ease their operations and availability. In all this dynamics the security becomes an utmost factor to be considered. Looking at the delicacy of web security measures a firm is taking, independent testing firms came into the picture. This shift leaves firms vulnerable to unexpected security threats. It is also collective effort of the service providers, cloud service providers to ensure security and integrity of an enterprise is maintained.
The product or service in its inception is developed keeping in view the expected the results or criteria which it is intended to be put to use. The user is also expected to use the application in a particular fashion but the case is always not the same. Today with the advancement and availability of technology the end user is quite versatile and sometimes mischievous in a manner of speaking. The breach in security of web-site or as a matter of fact any application/service can be intentional as well as non-intentional. As a provider of service/product we can pray for the user to use it in the desired manner but one has to be prepared for the unexpected use also. While taking security measures one has to think from intentional perspectives as well. A person who has written a code himself can be at loss in testing/verifying the code from the view point of finding loop holes. One has to think from intentional perspective or popularly ethical Hackers perspective. The independent testing firms with expertise in niche skill domain can come in very handy in making a service or product robust. With the varied pool of talent and the right mix of approach the testing firms can provide the essential or fix the points where an application can be toyed with.
Waterfall model has been in quite usage from some time. Normally the flow in the model is as follows: System feasibility -> Requirement analysis -> System design -> Coding and unit testing. In this phase, the actual coding is done for the various modules. Generally the coder himself reviews the code and individually test the functionality of each module -> Integration and system testing. In this phase, integration of all the modules in the system is done and testing is done of the entire system, making sure that the modules meet the requirements. -> Deployment and maintenance. In this phase, the software is deployed in the production environment. One can rectify any errors that are identified in this phase, and tweak the functionality based on the updated requirements.
http://www.360logica.com [email protected]
White Paper
Conclusion
With the advancement of more and more people shifting to web based applications, which definitely makes life and work easy one has to take care of threats which comes with the package. Threats are not just for the consumer but for the enterprises as well. Common threats can be like Web-based attacks, Social phishing, Malicious data loss etc. One has to take care of prevention mechanism rather responsive mechanism.
http://www.360logica.com [email protected]
White Paper