Methods and Techniques of Security Testing: A Survey
نویسندگان
چکیده
Security Testing helps in protecting the software against unanticipated actions. The target of security testing is to provide assurance regarding that the software is safe and secure. Security testing is very helpful in identifying loop holes and security risk in the software. Our Objective is to provide comprehensive survey of security Testing methods and Techniques where security Testing Techniques can be classified as: Technical assessment Techniques and non-Technical Assessment Techniques. As a Result of classifying these approaches a direction for integration and future research topic is illustrated. This study presents sophisticated ideas in a simplified form that should be beneficial to both practitioners and researchers in solving software security testing issues.
منابع مشابه
Study of Environmental Security in the City Case study: Regions 1 and 4 of Arak
Security has always been one of the most basic needs of human and improves social interactions, personal and social peace, prosperity of the people and thus caused the improvement of society. Modern urban spaces admitting to crimes and aberrations resulting in lack of security in the city, Security Survey in urban areas is an important issue. This paper examined the impact of residents' sense o...
متن کاملSecurity Testing: A Survey
Identifying vulnerabilities and ensuring security functionality by security testing is a widely applied measure to evaluate and improve the security of software. Due to the openness of modern software-based systems, applying appropriate security testing techniques is of growing importance and essential to perform effective and efficient security testing. Therefore, an overview of actual securit...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملModel-Based Security Testing
Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on ...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014