scholarly journals The Vacuity of the Open Source Security Testing Methodology Manual

Author(s):  
Martin R. Albrecht ◽  
Rikke Bjerg Jensen
IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 149444-149463 ◽  
Author(s):  
Sara Nieves Matheu ◽  
Jose Luis Hernandez-Ramos ◽  
Salvador Perez ◽  
Antonio F. Skarmeta

2019 ◽  
Vol 8 (4) ◽  
pp. 1552-1556

In recent years, utilization of web applications, web hacking exercises have grown exponentially. Organizations are confronting extremely critical difficulties in anchoring their web applications from rising cyber threats, as bargain with the assurance issues don't appear to be the right approach. Vulnerability Assessment and Penetration Testing (VAPT) methods help us find these vulnerabilities / security loopholes in our systems even before an intruder could find a way to get it. This helps avoid zero-day exploits. This paper aims to elucidate the overview of Vulnerability Assessment and Penetration Testing and introduce the most efficient open source tools used to perform these tests. This paper also presents a combined VAPT testing methodology that incorporates strengths of several existing approaches, with the goal to understand their utility and benefit the most from the tests.


Author(s):  
A. F. Tappenden ◽  
T. Huynh ◽  
J. Miller ◽  
A. Geras ◽  
M. Smith

This article outlines a four-point strategy for the development of secure Web-based applications within an agile development framework and introduces strategies to mitigate security risks that are commonly present in Web-based applications. The proposed strategy includes the representation of security requirements as test cases supported by the open source tool FIT, the deployment of a highly testable architecture allowing for security testing of the application at all levels, the outlining of an extensive security testing strategy supported by the open source unit-testing framework HTTPUnit, and the introduction of the novel technique of security refactoring that transforms insecure working code into a functionally-equivalent secure code. Today, many Web-based applications are not secure, and limited literature exists concerning the use of agile methods within this domain. It is the intention of this article to further discussions and research regarding the use of an agile methodology for the development of secure Web-based applications.


Author(s):  
Fadi P. Deek ◽  
James A. M. McHugh
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document