Preview

COMPUTER PLATFORM 2

Better Essays
Open Document
Open Document
3995 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
COMPUTER PLATFORM 2
TABLE OF CONTENTS

INTRODUCTION

The decision has been taken by Appledore Accountants Plc to set up a new computer support department in-house. I have been assigned as a Senior Support Technician, to set up new procedures. To be more explicit, it is about the production of: acceptance plans for hardware and software, of security policies, health and safety requirements and setting standards for user documentation.
So, I am going to start describing white box testing and black box testing, and then I will produce a Windows XP user guide, along with a security policy for the stand-alone PCs.

1 DESCRIPTION OF WHITE BOX TESTING AND BLACK BOX TESTING
1.1 About white box testing
Any security testing method is supposed to ensure that the system is robust enough to face malicious attacks or regular software failures.
Thus, let us enumerate some main points about white box testing:
To know how the system is implemented will allow white box testing to be performed. White box testing includes analyzing data flow, control flow, information flow, coding practices, exception and error handling within the system, to test the expected and unexpected software behaviour.
White box testing can be carried out to validate whether code implementation follows intended design, to validate implemented security functionality, and to expose exploitable vulnerabilities.
White box testing needs to access the source code. It is indeed worth performing white box testing during the unit testing phase.
White box testing requires knowing what makes software secure or insecure, how to think like an attacker, and how to use different testing tools and techniques.
The first step in white box testing is to understand and analyze the source code, so knowing what makes software secure is a fundamental obligation.
Secondly, to create tests that exploit software, a tester must think like an attacker.
Thirdly, to perform testing efficiently,



References: 1) www.utoronto.ca 2) http://www.stmarysbelfast.ac.uk

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Because if the information is not tested properly during the testing phase then its possibility that the information is not skewed. And also if the environment is not safe then there can be some compliance issues.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    Solomon, M. G. (2014). Security Strategies in Windows Platforms and Applications. Burlington: Jones & Bartlett Learning.…

    • 338 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    There will be an offline of White Box Testing technique and Test Case Generation manual, and floating tooltips will be employed in the application.…

    • 1533 Words
    • 7 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Psych 535

    • 1187 Words
    • 5 Pages

    The Spearman-Brown formula allows a test developer to estimate internal consistency reliability from a correlation of two halves of a test. It is a very specific application of a general formula to estimate the reliability of a test.…

    • 1187 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    This project will include 1 consultant for a time period of 2 days onsite at a single customer location in order to provide internal penetration testing services. Malcolm Testing Solutions will provide tools, knowledge, and expertise in order to execute an internal penetration test on customer designated devices. Malcolm Testing Solutions will attempt to compromise access controls on internal systems by employing the following methodology:…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Test of consistency, test of correspondence, test of priority of data, test of cohesiveness, test of thoroughness.…

    • 806 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    The most accurate way to assess vulnerabilities in an IT system is by penetration testing, which simulates an actual attack. It can be dangerous to both the targeted organization, as well as the penetration team. Since the testers use the same tools as an actual attacker, systems and networks could really be brought down during the “attack.” One of the biggest advantages to penetration testing is that it tests not only the security of the infrastructure, but the readiness of the response team as well. Even though a more realistic test would be performed during normal working hours when productivity would be affected, even after hours tests could cause problems. A successful attack could bring resources down and it may take time for them to come back up. All penetration testing should be signed off on by management prior to the test commencing.…

    • 591 Words
    • 2 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    operating system

    • 464 Words
    • 2 Pages

    1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this type of application.…

    • 464 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Penetration Test plan

    • 869 Words
    • 4 Pages

    The scope of this project is to perform a penetration test on the web-based application server, Cisco Core Backbone Network, and post penetration test assessment. All other aspects are considered out of scope.…

    • 869 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    They’re designed to threat the application as an “unknown entity”; therefore, no knowledge of the tiers is provided.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Beberapa tahapan yang dilalui pada rangkaian software development adalah untuk mendapatkan spesifikasi software yang diinginkan baik client atau developer. Sebelum rangkaian proses developt software, ada satu tahapan yang harus dilakukan untuk mendapatkan hasil yang optimal. Yakni tahapan testing. Tahapan testing dilakukan untuk melakukan uji coba yang dilakukan pada software untuk menentukan kapabilitas software tersebut. Meliputi fungsionalitasnya maupun yang aspek non fungsional sebuah sistem. Tahapan testing bisa dilakukan dalam dua teknik yakni white box dan black box testing. Black Box pengujian adalah metode pengujian perangkat…

    • 1203 Words
    • 5 Pages
    Powerful Essays

Related Topics