The Plan and Tools for Vulnerability Testing in Information Software-Based System
نویسندگان
چکیده
Although many tests for stabilization of the software have been done, vulnerability test for a system run by combination of the software of various products has not been conducted enough. This has led to increased threats and vulnerability of system. Especially, web-based software system, which is public, has inherent possibility of exposure to attacks and is likely to be seriously damaged by an accident. Consequently, comprehensive and systematic test plans and techniques are required. Moreover, it is necessary to establish a procedure for managing and handling the results of vulnerability test. This paper proposes vulnerability test plans and designs for implementing automated tools, both of which can be complied with on web-based software systems.
منابع مشابه
Security testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملPlanning a strategy to reduce the vulnerability of the Faculty of Architecture of Kurdistan University against earthquakes
Background and objective: Educational areas, due to their high number of users, obsolescence and structural instabilities have a high vulnerability to earthquake and fire. Among educational centers, universities are more vulnerable when encountered hazards because of the high number of users as well as unique documents and studies. Non-structural disorders and also lack of awareness of universit...
متن کاملOnline survey software as a data collection tool for medical education: A case study on lesson plan assessment
Background: There are no general strategies or tools to evaluate daily lesson plans; however, assessments conducted using traditional methods usually include course plans. This study aimed to evaluate the strengths and weaknesses of online survey software in collecting data on education in medical fields and the application of such softwares to evaluate students' views and modification of lesso...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملOptimization of Waste Collection System Using Underground Containers with Source Separation Plan (Case Study: District 3 of Yazd Municipality, Iran)
Introduction: Optimization of waste collection systems can reduce waste management costs. In this study, optimization of the waste collection system of district 3 of Yazd municipality of Iran has been investigated using underground containers. Materials and Methods: In this research, after collecting information and performing field inspections, the statistical and raster information obtained ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JIPS
دوره 1 شماره
صفحات -
تاریخ انتشار 2005