0% found this document useful (0 votes)
30 views

7 - Security Testing

Study this security testing

Uploaded by

tssyahoo1
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

7 - Security Testing

Study this security testing

Uploaded by

tssyahoo1
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

SECURITY

TESTING
WHAT IS SECURITY
TESTING?
• A type of software testing
that detects vulnerabilities,
threats, and risks in an
application to prevent
malicious attacks.
• Its goal is to identify potential
weaknesses that could lead
to loss of data, revenue, or
reputation due to internal or
why is it
important?
• The primary goal of security
testing is to identify system
threats and assess
vulnerabilities to prevent
exploitation and ensure
continuous operation.
• It also helps detect security
risks and aids developers in
fixing issues through coding.
1 Vulnerability Scanning

types 2 Security Scanning

3 Penetration Testing

4 Risk Assessment

5 Security Auditing

6 Ethical Hacking

7 Posture Assessment
vulnerability
scanning
Done through
automated software to
scan a system against
known vulnerability
signatures
security
scanning
Involves identifying
network and system
weaknesses, and later
provides solutions for
reducing these risk.
PENETRATION
TESTING
Simulates and attack
from a malicious
hacker. Involves
analysis of potential
vulnerabilities to
external hacking
attempt.
Risk assessment
Analysis of security
risks observed in the
organization. Can be
classifies as Low,
Medium, and High.
Risk assessment
Analysis of security
risks observed in the
organization. Can be
classifies as Low,
Medium, and High.
SECURITY
AUDITING
Internal inspection of
Applications and
Operating systems for
flaws.
ETHICAL HACKING
Hacking and
Organization Software
system. The intent is to
expose security flaws in
the system.
Posture
assessment
Combines Security
scanning, Ethical
Hacking and Risk
Assessments to show
an overall security
posture of an
organization.
how to do security testing
how to do security testing
test plan should include

Security- Test Test Tool Analysis of


various
related Data required
tests
test related for outputs
cases or to security from
scenarios different
security testing
security
testing tools
methodologie
1 Tiger Box

s/approach/ 2 Black Box

techniques 3 Grey Box

for security
testing
Tiger box
Usually done on a
laptop which has a
collection of OSs and
hacking tools. Helps
penetrations testers
and security testers to
conduct vulnerabilities
black box
Tester is authorizes to
do testing on
everything about the
network topology and
the technology
grey box
Partial information is
given to the tester
about the system, and
it is a hybrid of white
and black box models
security 1 Hackers

testing roles 2 Crackers

3 Ethical Hacker

4 Script Kiddies or packet monkeys


HAckers
Access computer
system or network
without authorization
Crackers
Break into the systems
to steal or destroy data
ETHICAL HACKERS
Performs most of the
breaking activities but
with permission from
the owner
Script kiddies
or packet
Inexperienced hackers
monkeys
with programming
language skill
1 Intruder
security
2 Acunetix
testing tools 3 Open Web Application Security

Subject (OWASP)
4 Wireshark

5 w3af
Intruder
An enterprise-level
vulnerability scanner.
Provides prioritized
results and proactive
threat scans to save
time and enhance
Acunetix
By Invicti
Helps small to medium
business protect web
applications from data
breaches by detecting
a variety of security
issues and enabling
OWASP
A global non-profit
improving security
software security,
offering tools for
Open Web Application
penetration testing
Security Project
various software
environments and
Wireshark
A network packet
analyzer that captures
and displays real-time
network data, offering
detailed protocol and
packet information.
w3af
A web application
attack and audit
framework with
discovery, audit, and
attack plugins that
work together to find
and exploit
vulnerabilities in
THANK YOU FOR
LISTENING!

You might also like