Security Testing Is Not All The Same: A Reference Taxonomy

نویسنده

  • Jim Kates
چکیده

Security managers are always being offered new methods to test the security of their systems. Unfamiliarity with the terminology and types of testing can result in the manager not getting the services he or she is seeking. This article presents a taxonomy of terms in order to classify the different types of services available, and explain how each technique evaluates security controls in real-world settings.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Innovative approach to strata reinforcement in coal mines with reference to evaluation cable bolts shear strength

There is an increasing need to determine accurately the strength properties of tendons for an effective ground control on mines and underground structures as well as on modelling simulations. The strength properties of cables, used as cable bolts, have been evaluated mainly by their ultimate tensile strength, as this kind of test can be carried out in the field as well as in the laboratory. Onl...

متن کامل

Towards a Taxonomy of Network Security Assessment Techniques

Vulnerability assessment tools are coming into widespread use, but the methods that they use are not well understood. We present a taxonomy of methods for testing if a target is vulnerable to a particular attack.

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

مفهوم و جایگاه حق تأمین اجتماعی در اسناد بین‌المللی

Social security as a social and historical phenomenon, is being considered as the result of economic and social development process especially in developing industrial societies proposed as the individual security requirements against the social risks but its legal norms in the human right framework needs international community attention on the basis of issuing international documents, rules a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Information Systems Security

دوره 6  شماره 

صفحات  -

تاریخ انتشار 1998