Skip to main content

Posts

Showing posts from December, 2020

Software Security Testing Part - II

 Types of Software Security Testing Introduction   Welcome to the second module of software security testing workshop.In this module, we will be exploring different types of evaluating software security. It is recommended that you should first complete the previous module in order to build a knowledge base in this domain, which will help you continue in this workshop with a separate mind set on how to be an expert in software security testing.  Software Security Testing    Different organizations and different security professionals define it differently and mostly all are correct. There are different ways of understanding software security testing. Following are some well known concepts:,    “Security testing which is non-functional in nature, more focused on security aspects”                          OR  “It is a type of testing in which a security professional performs different types of attacks to check the security blueprint of the software in order to find if the software or appl

Software Security Testing Part - I

  The Basics of Software Security Introduction   Welcome to the first module of this workshop. In this workshop, we will be learning about the overall software security testing happening in the field of information security, covering many aspects of security. However, in this module, we will talk about the knowledge base, the basics of software security.  Prerequisites  • Sound knowledge in computer programming  • Sound knowledge of information security and related technologies  • Expert in any one programming language  The Software Industry    The software industry is approximately 50+ years old and it has progressed from a very basic level of software to complex development and now there is a lot of competition among developers and in the mobile software development market.    Most importantly, in today’s software industry, there are threats to the software we normally and generally use, e.g., operating systems, like Windows. However, to overcome this, we use different types of to