SlideShare a Scribd company logo
S.VikeshS.Vikesh KumarKumar
AgendaAgenda
What is Security Testing
Purpose of Security Testing
Basic Security Testing Concepts
Security Testing Techniques
What is Security TestingWhat is Security Testing
Security Testing is a process to determine that an
information system protects data and maintain function
To check whether there is a data leakage
To test the application, Whether it has unauthorized
access and having encoded security code
To find out all the potential loopholes and weakness in
the system
Purpose of Security TestingPurpose of Security Testing
Primary purpose of security testing is to identify
vulnerabilities and repair them.
Security Testing helps in improving the current
system and also helps in ensuring that the system will
work for longer time.
Security Tests helps in finding out loopholes that can
cause loss of important information.
Six basic security conceptsSix basic security concepts
Confidentiality
Integrity
Authentication
Authorization
Availability
Non-Repudiation
Basic Security ConceptsBasic Security Concepts
Confidentiality
Ensuring Information is accessible only for those with
authorized access and prevent information theft.
Integrity
A Measure intended to allow the receiver to determine
that the information which it is providing is correct.
Authentication
The Process of establishing the identity of the user.
Basic Security Concepts (Cont..)Basic Security Concepts (Cont..)
Authorization
The Process of determining that a requester is allowed to
receive a service or perform an operation.
Availability
Assuring information and communicates services will be
ready for use when expected
Non-Repudiation
A measure intended to prevent the later denial that an
action happened or communication that took place etc.,
Security Testing TechniquesSecurity Testing Techniques
Main Security Testing Techniques are:
Vulnerability Scanning
Security Scanning
Penetration Testing
Ethical Hacking
Risk Assessment
Security Auditing
Posture Assessment & Security Testing
Password Cracking
Vulnerability Scanning
 It involves scanning of the application for all known
vulnerabilities.
 Generally done through various vulnerability scanning
software. Ex : Nessus, Sara and ISS.
Security Scanning
 Scanning and Verification of system and application.
Find out weakness in the OS, Application and networks.
Penetration Testing
 Tester may try to enter the application/System with the help of
some other application or with the help of loopholes that the
application has kept open unknowingly.
 It is an effective way to find loopholes in application.
Ethical Hacking
 Ethical Hacking involves number of penetration test over the
wide network on the system under test. It is conducted by
ethical hackers to find possible problems in the system.
Risk Assessment
It a method of analyzing and deciding the risk that depends
upon the type of loss and possibility/probability of loss
occurrence.
It is carried out through various interviews, discussion and
analysis.
Security Auditing
Security Auditing involves hands on internal inspection of
OS and application, often via line by line inspection of code.
A Security audit is a systematic evaluation of the security of
company’s information system.
Posture Assessment and Security Testing
 It Combines Security Scanning Ethical Hacking and Risk
Assessment to show an Overall Security Posture of
Organization.
Password Cracking
Password Cracking programs can be used to identify weak
passwords.
 Password cracking verifies that uses are employing sufficiently
strong password.
ConclusionConclusion
Functional Software testing is not enough
Security Testing must be included in Software
development process
Software quality and Software security are
intertwined, We cannot have one without the another
Any Queries?
Ad

More Related Content

What's hot (20)

Security testing
Security testingSecurity testing
Security testing
Tabăra de Testare
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
Deepu S Nath
 
Classification of vulnerabilities
Classification of vulnerabilitiesClassification of vulnerabilities
Classification of vulnerabilities
Mayur Mehta
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
 
Security testing
Security testingSecurity testing
Security testing
Khizra Sammad
 
Security testing
Security testingSecurity testing
Security testing
Rihab Chebbah
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
Mark Conway
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?
ONE BCG
 
Application Security
Application SecurityApplication Security
Application Security
Reggie Niccolo Santos
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
OWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-DiveOWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-Dive
Prathan Phongthiproek
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Security testing ?
Security testing ?Security testing ?
Security testing ?
Maikel Ninaber
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
Marco Morana
 
Web application security
Web application securityWeb application security
Web application security
Kapil Sharma
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
Deepu S Nath
 
Classification of vulnerabilities
Classification of vulnerabilitiesClassification of vulnerabilities
Classification of vulnerabilities
Mayur Mehta
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
Mark Conway
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?
ONE BCG
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
Marco Morana
 
Web application security
Web application securityWeb application security
Web application security
Kapil Sharma
 

Similar to Security testing vikesh kumar (20)

Exploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity TestingExploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity Testing
jatniwalafizza786
 
What is Security Testing Presentation download
What is Security Testing Presentation downloadWhat is Security Testing Presentation download
What is Security Testing Presentation download
Rosy G
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
wilnawilliams3
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
wilnawilliams3
 
Learn more about the Penetration Services
Learn more about the Penetration ServicesLearn more about the Penetration Services
Learn more about the Penetration Services
wilnawilliams3
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
Alisha Henderson
 
Best Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxBest Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docx
Afour tech
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Falgun Rathod
 
Security Testing.pptx
Security Testing.pptxSecurity Testing.pptx
Security Testing.pptx
osandadeshan
 
The Fundamentals of Penetration Testing.pptx (1).pdf
The Fundamentals of Penetration Testing.pptx (1).pdfThe Fundamentals of Penetration Testing.pptx (1).pdf
The Fundamentals of Penetration Testing.pptx (1).pdf
apurvar399
 
How to Conduct Penetration Testing for Websites.pptx.pdf
How to Conduct Penetration Testing for Websites.pptx.pdfHow to Conduct Penetration Testing for Websites.pptx.pdf
How to Conduct Penetration Testing for Websites.pptx.pdf
Rosy G
 
Software security testing
Software security testingSoftware security testing
Software security testing
nehabsairam
 
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docxBlack Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
yogitathakurrr3
 
SDET UNIT 5.pptx
SDET UNIT 5.pptxSDET UNIT 5.pptx
SDET UNIT 5.pptx
Dr. Pallawi Bulakh
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
CyberPro Magazine
 
Penetration Testing Service in India Senselearner .pdf
Penetration Testing Service in India Senselearner .pdfPenetration Testing Service in India Senselearner .pdf
Penetration Testing Service in India Senselearner .pdf
Sense Learner Technologies Pvt Ltd
 
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodOpen Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Falgun Rathod
 
Application Security Testing Benefits Value and Tools
Application Security Testing Benefits Value and ToolsApplication Security Testing Benefits Value and Tools
Application Security Testing Benefits Value and Tools
SofiaCarter4
 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdf
AmeliaJonas2
 
Exploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity TestingExploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity Testing
jatniwalafizza786
 
What is Security Testing Presentation download
What is Security Testing Presentation downloadWhat is Security Testing Presentation download
What is Security Testing Presentation download
Rosy G
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
wilnawilliams3
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
wilnawilliams3
 
Learn more about the Penetration Services
Learn more about the Penetration ServicesLearn more about the Penetration Services
Learn more about the Penetration Services
wilnawilliams3
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
Alisha Henderson
 
Best Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxBest Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docx
Afour tech
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Falgun Rathod
 
Security Testing.pptx
Security Testing.pptxSecurity Testing.pptx
Security Testing.pptx
osandadeshan
 
The Fundamentals of Penetration Testing.pptx (1).pdf
The Fundamentals of Penetration Testing.pptx (1).pdfThe Fundamentals of Penetration Testing.pptx (1).pdf
The Fundamentals of Penetration Testing.pptx (1).pdf
apurvar399
 
How to Conduct Penetration Testing for Websites.pptx.pdf
How to Conduct Penetration Testing for Websites.pptx.pdfHow to Conduct Penetration Testing for Websites.pptx.pdf
How to Conduct Penetration Testing for Websites.pptx.pdf
Rosy G
 
Software security testing
Software security testingSoftware security testing
Software security testing
nehabsairam
 
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docxBlack Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
yogitathakurrr3
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
CyberPro Magazine
 
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodOpen Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Falgun Rathod
 
Application Security Testing Benefits Value and Tools
Application Security Testing Benefits Value and ToolsApplication Security Testing Benefits Value and Tools
Application Security Testing Benefits Value and Tools
SofiaCarter4
 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdf
AmeliaJonas2
 
Ad

Recently uploaded (20)

Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
wareshashahzadiii
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Adobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install IllustratorAdobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install Illustrator
usmanhidray
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 
Sales Deck SentinelOne Singularity Platform.pptx
Sales Deck SentinelOne Singularity Platform.pptxSales Deck SentinelOne Singularity Platform.pptx
Sales Deck SentinelOne Singularity Platform.pptx
EliandoLawnote
 
Download YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full ActivatedDownload YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full Activated
saniamalik72555
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
Mastering OOP: Understanding the Four Core Pillars
Mastering OOP: Understanding the Four Core PillarsMastering OOP: Understanding the Four Core Pillars
Mastering OOP: Understanding the Four Core Pillars
Marcel David
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
Xforce Keygen 64-bit AutoCAD 2025 Crack
Xforce Keygen 64-bit AutoCAD 2025  CrackXforce Keygen 64-bit AutoCAD 2025  Crack
Xforce Keygen 64-bit AutoCAD 2025 Crack
usmanhidray
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
Minitab 22 Full Crack Plus Product Key Free Download [Latest] 2025
wareshashahzadiii
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Adobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install IllustratorAdobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install Illustrator
usmanhidray
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 
Sales Deck SentinelOne Singularity Platform.pptx
Sales Deck SentinelOne Singularity Platform.pptxSales Deck SentinelOne Singularity Platform.pptx
Sales Deck SentinelOne Singularity Platform.pptx
EliandoLawnote
 
Download YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full ActivatedDownload YouTube By Click 2025 Free Full Activated
Download YouTube By Click 2025 Free Full Activated
saniamalik72555
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
Mastering OOP: Understanding the Four Core Pillars
Mastering OOP: Understanding the Four Core PillarsMastering OOP: Understanding the Four Core Pillars
Mastering OOP: Understanding the Four Core Pillars
Marcel David
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
Xforce Keygen 64-bit AutoCAD 2025 Crack
Xforce Keygen 64-bit AutoCAD 2025  CrackXforce Keygen 64-bit AutoCAD 2025  Crack
Xforce Keygen 64-bit AutoCAD 2025 Crack
usmanhidray
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)
Andre Hora
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Ad

Security testing vikesh kumar

  • 2. AgendaAgenda What is Security Testing Purpose of Security Testing Basic Security Testing Concepts Security Testing Techniques
  • 3. What is Security TestingWhat is Security Testing Security Testing is a process to determine that an information system protects data and maintain function To check whether there is a data leakage To test the application, Whether it has unauthorized access and having encoded security code To find out all the potential loopholes and weakness in the system
  • 4. Purpose of Security TestingPurpose of Security Testing Primary purpose of security testing is to identify vulnerabilities and repair them. Security Testing helps in improving the current system and also helps in ensuring that the system will work for longer time. Security Tests helps in finding out loopholes that can cause loss of important information.
  • 5. Six basic security conceptsSix basic security concepts Confidentiality Integrity Authentication Authorization Availability Non-Repudiation
  • 6. Basic Security ConceptsBasic Security Concepts Confidentiality Ensuring Information is accessible only for those with authorized access and prevent information theft. Integrity A Measure intended to allow the receiver to determine that the information which it is providing is correct. Authentication The Process of establishing the identity of the user.
  • 7. Basic Security Concepts (Cont..)Basic Security Concepts (Cont..) Authorization The Process of determining that a requester is allowed to receive a service or perform an operation. Availability Assuring information and communicates services will be ready for use when expected Non-Repudiation A measure intended to prevent the later denial that an action happened or communication that took place etc.,
  • 8. Security Testing TechniquesSecurity Testing Techniques Main Security Testing Techniques are: Vulnerability Scanning Security Scanning Penetration Testing Ethical Hacking Risk Assessment Security Auditing Posture Assessment & Security Testing Password Cracking
  • 9. Vulnerability Scanning  It involves scanning of the application for all known vulnerabilities.  Generally done through various vulnerability scanning software. Ex : Nessus, Sara and ISS. Security Scanning  Scanning and Verification of system and application. Find out weakness in the OS, Application and networks. Penetration Testing  Tester may try to enter the application/System with the help of some other application or with the help of loopholes that the application has kept open unknowingly.  It is an effective way to find loopholes in application.
  • 10. Ethical Hacking  Ethical Hacking involves number of penetration test over the wide network on the system under test. It is conducted by ethical hackers to find possible problems in the system. Risk Assessment It a method of analyzing and deciding the risk that depends upon the type of loss and possibility/probability of loss occurrence. It is carried out through various interviews, discussion and analysis. Security Auditing Security Auditing involves hands on internal inspection of OS and application, often via line by line inspection of code. A Security audit is a systematic evaluation of the security of company’s information system.
  • 11. Posture Assessment and Security Testing  It Combines Security Scanning Ethical Hacking and Risk Assessment to show an Overall Security Posture of Organization. Password Cracking Password Cracking programs can be used to identify weak passwords.  Password cracking verifies that uses are employing sufficiently strong password.
  • 12. ConclusionConclusion Functional Software testing is not enough Security Testing must be included in Software development process Software quality and Software security are intertwined, We cannot have one without the another