Methods and Techniques of Security Testing: A Survey

نویسندگان

  • Divya Nigam
  • Vinita Malik
  • Sarvagya Nigam
چکیده

Security Testing helps in protecting the software against unanticipated actions. The target of security testing is to provide assurance regarding that the software is safe and secure. Security testing is very helpful in identifying loop holes and security risk in the software. Our Objective is to provide comprehensive survey of security Testing methods and Techniques where security Testing Techniques can be classified as: Technical assessment Techniques and non-Technical Assessment Techniques. As a Result of classifying these approaches a direction for integration and future research topic is illustrated. This study presents sophisticated ideas in a simplified form that should be beneficial to both practitioners and researchers in solving software security testing issues.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Study of Environmental Security in the City Case study: Regions 1 and 4 of Arak

Security has always been one of the most basic needs of human and improves social interactions, personal and social peace, prosperity of the people and thus caused the improvement of society. Modern urban spaces admitting to crimes and aberrations resulting in lack of security in the city, Security Survey in urban areas is an important issue. This paper examined the impact of residents' sense o...

متن کامل

Security Testing: A Survey

Identifying vulnerabilities and ensuring security functionality by security testing is a widely applied measure to evaluate and improve the security of software. Due to the openness of modern software-based systems, applying appropriate security testing techniques is of growing importance and essential to perform effective and efficient security testing. Therefore, an overview of actual securit...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Model-Based Security Testing

Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on ...

متن کامل

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014