Security Quality Assurance through Penetration Testing

被引:0
|
作者
Shaukat, Kamran [1 ]
Faisal, Amber [1 ]
Masood, Rabia [1 ]
Usman, Ayesha [1 ]
Shaukat, Usman [1 ]
机构
[1] Panjab Univ, Jhelum Campus, Jhelum, Pakistan
关键词
Security; Penetration Testing; Methodologies; Approaches; Tools;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security is a worldwide issue. Individuals need their information and frameworks secure from malevolent dangers and assaults. A framework must be secured inside and out from illegal penetration. Security quality affirmation checks if the application is defenseless against assaults, in the event that anybody can hack the framework or login to the application with no approval. It is a procedure to discover that a data framework ensures information and keeps up usefulness as proposed. While penetration testing is the procedure that incorporates gathering data about the objective before the test, recognizing conceivable passage focuses, endeavoring to soften up and reporting back the discoveries. In this paper we have surveyed different frameworks which can be secured at testing (security) level through the infiltration testing approach and proposed an entrance testing technique to secure frameworks like databases, networks, web applications and Android. Great testing issues clear affirmation of issue and give a beginning stage of registering arrangement. The point of convergence of entrance testing is high reality powerlessness and there is no false positive about it.
引用
收藏
页码:131 / 136
页数:6
相关论文
共 50 条
  • [1] Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing
    Ankele, Ralph
    Marksteiner, Stefan
    Nahrgang, Kai
    Vallant, Heribert
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [2] Security Analysis of VoIP Networks Through Penetration Testing
    Ochang, Paschal A.
    Irving, Philip
    [J]. INFORMATION AND SOFTWARE TECHNOLOGIES (ICIST 2017), 2017, 756 : 601 - 610
  • [3] Security Testing as part of Software Quality Assurance: Principles and Challenges
    Mallouli, Wissam
    [J]. 2022 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2022), 2022, : 29 - 29
  • [4] Software Quality Improvement Through Penetration Testing
    Jat, Subhash Chandra
    Lamba, C. S.
    Rathore, Vijay Singh
    [J]. EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 239 - 244
  • [5] SOFTWARE QUALITY ASSURANCE THROUGH PROTOTYPING AND AUTOMATED TESTING
    STAKNIS, ME
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 1990, 32 (01) : 26 - 33
  • [6] Vulnerability Assessment for Applications Security Through Penetration Simulation and Testing
    Lachkov, Petar
    Tawalbeh, Lo'ai
    Bhatt, Smriti
    [J]. JOURNAL OF WEB ENGINEERING, 2022, 21 (07): : 2187 - 2208
  • [7] Quality assurance of sintered refractories through nondestructive testing with microwaves
    Dannheim, H
    Hadrich, H
    [J]. GLASTECHNISCHE BERICHTE-GLASS SCIENCE AND TECHNOLOGY, 1998, 71 (08): : 223 - 229
  • [8] MINIMIZING PERFORMANCE VARIABILITY IN SWEAT TESTING THROUGH QUALITY ASSURANCE
    LeGrys, Vicky A.
    [J]. PEDIATRIC PULMONOLOGY, 2010, : 164 - 165
  • [9] A Raise of Security Concern in IoT Devices: Measuring IoT Security Through Penetration Testing Framework
    Jaafar, Abdul Ghafar
    Ismail, Saiful Adli
    Habir, Abdul
    Ariffin, Khairul Akram Zainol
    Yusop, Othman Mohd
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 676 - 690
  • [10] Quality Assurance through Rigorous Software Specification and Testing: A Case Study
    Lin, Lan
    He, Jia
    Zhang, Yong
    Song, Fengguang
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND SOFTWARE ENGINEERING (SCSE'15), 2015, 62 : 257 - 265