Security testing: Difference between revisions

Content deleted Content added
Reverting to last known good version to remove linkspam.
various changes
Line 8:
== Confidentiality ==
 
* A security measure which protects against the disclosure of information to parties other than the intended recipient is by no means the only way of ensuring the security. <ref name=":0">{{Cite web |last=A |first=Madhu |date=2017-12-04 |title=The Six Principles of Security Testing {{!}} Trigent Vantage |url=https://blog.trigent.com/the-six-principles-of-security-testing/ |access-date=2022-08-28 |language=en-US}}</ref>
 
== Integrity ==
Line 16:
* A measure intended to allow the receiver to determine that the information provided by a system is correct.
* Integrity schemes often use some of the same underlying technologies as confidentiality schemes, but they usually involve adding information to a communication, to form the basis of an algorithmic check, rather than the encoding all of the communication.
* To check if the correct information is transferred from one application to other. <ref name=":0" />
 
== Authentication ==
 
This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labelling claims to be, or assuring that a [[computer program]] is a trusted one. <ref name=":0" />
 
== Authorization ==