Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Software penetration testing

B. Arkin ; S. Stender ; G. McGraw


Published in: IEEE Security & Privacy ( Volume: 3, Issue: 1, Jan.-Feb.
2005
Page(s): 84 - 87
Date of Publication: 14 February 2005 
Print ISSN: 1540-7993
Sivanandha
TP038986
UC3F1702 IT(ISS)
Abstract:
• Assuring that a software application fulfills its functional business
requirements.
• dynamic functional tests to ensure proper implementation of the
application's features.
Introduction
• Penetration testing is applied of all software security best practices, in
part because it's an attractive late lifecycle activity. 
Limitation

•  Approach is that it almost always represents a too little, too late


attempt to tackle security at the end of the development cycle.
•  Security consultants typically perform assessments like this in a “time
boxed” manner.
CAUSE

• Organizations fail to integrate


security through the
development process, their
software suffers from systemic
faults both at the design level
and in the implementation.

You might also like