The Roles of Software Testing & QA in Security Testing



Similar documents
Penetration Testing Service. By Comsec Information Security Consulting

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Web App Security Audit Services

Network and Host-based Vulnerability Assessment

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

The Top Web Application Attacks: Are you vulnerable?

The Key to Secure Online Financial Transactions

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Security aspects of e-tailing. Chapter 7

Network Security Audit. Vulnerability Assessment (VA)

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Web Application Report

Network Threats and Vulnerabilities. Ed Crowley

WEB APPLICATION SECURITY

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

A Decision Maker s Guide to Securing an IT Infrastructure

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

INTRODUCTION TO PENETRATION TESTING

Last update: February 23, 2004

Web Engineering Web Application Security Issues

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Security and Vulnerability Testing How critical it is?

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

New IBM Security Scanning Software Protects Businesses From Hackers

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

The New PCI Requirement: Application Firewall vs. Code Review

Passing PCI Compliance How to Address the Application Security Mandates


05.0 Application Development

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Security Testing & Load Testing for Online Document Management system

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Managed Security Services

Network Security: Introduction

Rational AppScan & Ounce Products

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Application security testing: Protecting your application and data

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group

Secure Code Development

The Self-Hack Audit Stephen James Payoff

COB 302 Management Information System (Lesson 8)

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

How To Prevent Hacker Attacks With Network Behavior Analysis

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Common Security Vulnerabilities in Online Payment Systems

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

What Do You Mean My Cloud Data Isn t Secure?

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

SecurityMetrics Vision whitepaper

Cisco Advanced Services for Network Security

Potential Targets - Field Devices

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Contents Introduction xxvi Chapter 1: Understanding the Threats: Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers

Protect Your Business and Customers from Online Fraud

Introduction to Penetration Testing Graham Weston

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Evaluation of Penetration Testing Software. Research

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

LINUX / INFORMATION SECURITY

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Penetration testing & Ethical Hacking. Security Week 2014

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

2015 TRUSTWAVE GLOBAL SECURITY REPORT

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

WEB ATTACKS AND COUNTERMEASURES

Transcription:

The Roles of Software Testing & QA in Security Testing Hung Q. Nguyen LogiGear, President and CEO Bob Johnson Independent, Security Consultant ASQ-SSQA Presentation, May 14, 2002

Objective To jump start your security testing program for Web sites and Web applications by offering An overview on testing for Web site and Web application security A perspective on the roles and responsibilities of software testing and QA in the security testing effort A forum for other professionals to share their thoughts on this topic

Security Overview Whom are we protecting? Ourselves The people with whom we are doing business or The owners of computer systems The users of those systems

Security Overview What are we protecting? Data Transaction data, user data, information resource, confidential business intelligence, etc. Intellectual properties Products, source code, software, hardware, etc. Resources Network resources, computing resources, etc.

Security Overview Who are the attackers? Black-hat hackers White-hat hackers Gray-hat hackers

Security Overview Why do attackers hack computer systems? To steal To disrupt activities by putting the system out of commission To embarrass by altering the behavior of the system To play a game

Security Overview The goals Security effort is an ongoing process of change, test, and improvement. Because it's impossible to have a perfectly secure system, the goal is to figure out the level of protection that is secure enough for an organization's needs. "Good enough," as narrowly defined, means that the security solutions will cost significantly less than the damage caused by a security breach. At the same time, the ideal solutions are ones that deter persistent intruders by making penetrating the system so difficult and time-consuming that it's not worthwhile as a reward even when their efforts succeed.

Security Overview What are the possible damages? Most of the damages, although not limited to, are financial losses including: Sales losses Property losses Productivity losses Litigation costs Publicity costs

Security Overview The big questions What risks are we willing to take in enduring the possible damages? How much funding are we willing to commit to minimize our risks? What is the objective and budget allocated for testing Web site and Web application security?

Security Overview What are the targets that need security protection? Data Host Network/Intranet Perimeter and additional focus on Internet Application

Common Vulnerabilities Interesting to software testing Information leaks Examples include sensitive information in the HTML pages, error messages, and public database and forums Back doors For example, enabling a logging routine bypassing authentication, or untested debugging routines left in production releases. Buffer overflows Errors might exist in production code, test and debugging code, or third-party code

Common Vulnerabilities Interesting to software testing Cookies Examples include cookie containing ID and password, account number, credit card number and other sensitive information. By changing the values or "poisoning the cookie, attackers can get access to accounts that are not theirs or access to unauthorized information. Stealing the cookie all together might allow attackers to gain access without having to enter I and password or any other methods of authentication. Bad data In coming data can t be trusted

Common Vulnerabilities Interesting to software testing Java scripts CGI For example, client-side checking can be bypassed Cross-site scripting issues For example, manipulating parameters to instruct a CGI to email an ID and password file to any user Java How safe? ActiveX Can make function calls to other DLLs?

Common Vulnerabilities Mildly interesting to software testing Physical attacks Denial-of-service attacks Spoofing attacks Virus and worm attacks Trojan horse attacks For more information www.qacity.com Sample tool list: www.insecure.org

Testing and QA Focus Testing for Web site and Web application security at the application level Testing for vulnerabilities and information leaks due primarily to programming practice, and to certain extends, due to misconfiguration of Web servers and other application-specific servers Test for security side effects Test for functionality side effects

Testing and QA Focus What can we learn from the attacking process? Information gathering? Checking out the system? Cracking the system? What are our objectives? Prevention: Help seeking out vulnerabilities and various means to exploit them so they can be fixed. Detection: Help determining the information that should be logged and mechanisms to track, alert and trap suspicious activities.

Testing and QA Focus What can we learn from the physical world and the digital world? In the physical universe, redundancy such as having additional locks, a security guard sitting by the door, or a badge reader can increase security. In the digital universe, redundancy increases complexity and might create additional vulnerabilities. Often, small utility programs surrounded by many layers of protection provide the security holes that compromise the entire system.

Testing Web Site/Application Security Testing the requirements and designs Testing the code and programming practices Testing interoperability with third-party components with specific focus on known vulnerabilities Testing for misconfiguration Testing the deployment Penetration testing

The Challenges We Face Outlining a clear division of responsibilities with the IT and software development staff in testing for securities Getting adequate resource and support to carry out the testing tasks Keeping up with new technologies and vulnerabilities that they bring Developing and maintaining a knowledge base on an on-going basis on common test techniques for sharing Keeping up with the available tools and their applicability and usefulness in supporting the software security testing

More Information for Testers

Software Testing and QA Roles Open discussion Are we focusing on the right tasks? Should we do more? Should we do less? Any testing techniques you would like to share? Any other thoughts you would like to share?

About LogiGear Corporation LogiGear Corporation is the first Silicon Valley-based software testing company to offer a full range of solutions to advance individual and organizational excellence in software testing. LogiGear offerings include in-depth technical and management expertise in software quality engineering, comprehensive advanced test engineering such as Action Based Testing, a structured approach to testing and testing automation, and outsource testing solutions, skill-based training curriculum for software testing professionals through LogiGear University, and world-class testing support products including TRACKGEAR, a Web-based defect management solution. www.logigear.com