Content deleted Content added
General formatting by script |
|||
Line 1:
{{Refimprove|date=August 2019}}
{{Information security}}
'''Security testing''' is a process intended to reveal flaws in
Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation.<ref>"Introduction to Information Security" US-CERT https://www.us-cert.gov/security-publications/introduction-information-security</ref> Actual security requirements tested depend on the security requirements implemented by the system. Security testing as a term has a number of different meanings and can be completed in a number of different ways. As such a Security Taxonomy helps us to understand these different approaches and meanings by providing a base level to work from.
== Confidentiality ==
* A security measure which protects against the disclosure of information to parties other than the intended recipient is by no means the only way of ensuring the security.
== Integrity ==
Integrity of information refers to protecting information from being modified by unauthorized parties
Line 17 ⟶ 19:
* To check if the correct information is transferred from one application to other.
== Authentication ==
This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one.
== Authorization ==
* The process of determining that a requester is allowed to receive a service or perform an operation.
* [[Access control]] is an example of authorization.
== Availability ==
* Assuring information and communications services will be ready for use when expected.
* Information must be kept available to authorized persons when they need it.
== Non-repudiation ==
* In reference to digital security, non-repudiation means to ensure that a transferred message has been sent and received by the parties claiming to have sent and received the message. Non-repudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.
== Taxonomy ==
Common terms used for the delivery of security testing:
Line 42 ⟶ 49:
* '''Security Review''' - Verification that industry or internal security standards have been applied to system components or product. This is typically completed through gap analysis and utilizes build / code reviews or by reviewing design documents and architecture diagrams. This activity does not utilize any of the earlier approaches (Vulnerability Assessment, Security Assessment, Penetration Test, Security Audit)
==
* CSA - Container and Infrastructure Security Analysis
* [[Dynamic application security testing|DAST]] - [[Dynamic Application Security Testing]]
Line 54 ⟶ 62:
* WAF - Web Application Firewall
== See also ==▼
▲==See also==
* [[National Information Assurance Glossary]]
== References ==
<references />
|