why security testing is necessary for an application

8
Why Security Testing is necessary for an Application

Upload: bugraptors

Post on 31-Jul-2016

213 views

Category:

Documents


0 download

DESCRIPTION

The very basic concern of security is your application should not allow Unauthorized and Unauthenticated users to enter in your application. Ethical hackers can make your private data public can also create Denial of services to an Authorized and Authenticated User.

TRANSCRIPT

Why Security Testing is necessary for an Application

*While creating a product we analyze a lot of things to create aproduct with Maximum efficiency. We spend 70 percent of our moneyon the Quality Services of the product. After creation of any productthe main concern is its Marketing, Productivity, Maintenance and themost important thing is its security.

*What if you have analyzed the every possible thing to make yourproduct most efficient but there is no plan for its security? So, the needof the hour is how we can make sure that our Application is secure fromthe vulnerable attacks, how we can be more confident about thesecurity of our product?

*When you have done with all quality assurance steps you have to gofor the Security Testing of the application. Security testing can ensureyou that your product is free from the attacks from hackers andSpammers and the risk of loss of information is minimum.

*The very basic concern of security is your application should not allowUnauthorized and Unauthenticated users to enter in your application.Ethical hackers can make your private data public can also createDenial of services to an Authorized and Authenticated User.

*Attackers can also cause the destruction and corruption to your datawhich may affect the popularity and productivity of your product.Sometime the attack is so much critical that you do not expect that yourproduct is under attack or someone is hacking your data. Except theseproblems the attacks can also affect the Upstream and downstream ofa website which may cause the excessive traffic to your website or webapplication and deny the users to use your application and sometimethere may be loss of data packets which will affect the business of thepopularity of your product Security Testing comes with great sense ofresponsibility and priority.

*There are many security techniques which can be used to enhance the

security of your product, some of these are as below:

� Vulnerability Scanning: In Vulnerability Scanning we scan the

software product to check whether there is any kind of threat from a

malicious software system. The system to be scan is independent to

the connectivity or not.

� Security Scanning: This scanning is done to verify the security of a

network and it can be done manually as well as automated.

� Penetration testing: This testing is done with known paths of code

and with the help of port addresses and IP addresses to test about

what extent an attacker can penetrate a system with known

information of a system.

� Risk Assessment: Risk assessment is done to analyze the risk of

security of a system. The risks are analyzed on the basis of their

priority.

� Security Auditing: Security auditing is done by inspecting the internal

code of a software product. It can be modular or line by line

inspection of code.

� Ethical hacking: Ethical Hacking can be done with the help of

professional hackers to test the security of a software product.

� Posture Assessment: This is a tailored security testing technique which

is a combination of two or more security testing techniques.

CONCLUSION :

From above discussion on Security of a product we come on a

conclusion that Security Testing is must to ensure the Quality and to

enhance the efficiency of a business. To make your data secure and

unique, to counter the attacks and loss of data and confidentiality

security Testing is a must. The usability of a software product should be

like no attacker can automate the script and flood the data on the

software product and for that there should be validation check with

every input field.