Testing Code Security

  • 4h 49m
  • Maura A. van der Linden
  • CRC Press
  • 2007

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and terminology, and can take a colossal amount of time and data mining to find. Written in simple, common terms, Testing Code Security is a consolidated resource designed to teach beginning and intermediate testers the software security concepts needed to conduct relevant and effective tests. Answering the questions pertinent to all testing procedures, the book considers the differences in process between security testing and functional testing, the creation of a security test plan, the benefits and pitfalls of threat-modeling, and the identification of root vulnerability problems and how to test for them. The book begins with coverage of foundation concepts, the process of security test planning, and the test pass. Offering real life examples, it presents various vulnerabilities and attacks and explains the testing techniques appropriate for each. It concludes with a collection of background overviews on related topics to fill common knowledge gaps. Filled with cases illustrating the most common classes of security vulnerabilities, the book is written for all testers working in any environment, and it gives extra insight to threats particular to Microsoft Windows platforms. Providing a practical guide on how to carry out the task of security software testing, Testing Code Security gives the reader the knowledge needed to begin testing software security for any project and become an integral part in the drive to produce better software security and safety.

About the Author

Maura van der Linden is a software development engineer in testing at Microsoft Corporation, working in their Security Technology Unit on the Malware Response Team. She has a B.A. degree in business administration from California State University-Northridge and over ten years in the software test discipline.

With a wide variety of experiences in testing, she began to write white papers and informational papers on test subjects for other testers and this, combined with her technical reviewing for MSDN Magazine resulted in her first foray into publishing, an article in this publication on testing for SQL injection vulnerabilities. The response to that article from other testers cemented the need for a book that is focused on how to get started in testing software security.

In this Book

  • Introduction
  • Security Vocabulary
  • Software Testing and Changes in the Security Landscape
  • All Trust Is Misplaced
  • Security Testing Considerations
  • Threat Modeling and Risk Assessment Processes
  • Personas and Testing
  • Security Test Planning
  • Sample Security Considerations
  • Vulnerability Case Study: Brute Force Browsing
  • Vulnerability Case Study: Buffer Overruns
  • Vulnerability Case Study: Cookie Tampering
  • Vulnerability Case Study: Cross-Site Scripting (XSS)
  • Vulnerability Case Study: Denial of Service/Distributed Denial of Service
  • Vulnerability Case Study: Format String Vulnerabilities
  • Vulnerability Case Study: Integer Overflows and Underflows
  • Vulnerability Case Study: Man-in-the-Middle Attacks
  • Vulnerability Case Study: Password Cracking
  • Vulnerability Case Study: Session Hijacking
  • Vulnerability Case Study: Spoofing Attacks
  • Vulnerability Case Study: SQL Injection
  • Fuzz Testing
  • Background: Cryptography
  • Background: Firewalls
  • Background: OSI Network Model
  • Background: Proxy Servers
  • Background: TCP/IP and Other Networking Protocols
  • Background: Test Case Outlining (TCO)
  • Additional Sources of Information
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)