Page 106 - SOFTWARE TESTING & QUALITY ASSURANCE
P. 106

Unit 7: Documentation and Security Testing




                                  In a network system the tester identifies the threats such as network threats,
                                  host threats, application threats, and so on.
               Document the Threats
               The tester will use a common document or template to record all the threats that he/she has detected in
               the system. A typical template consists of:
                1.   Threat Description: It defines the threat that has been detected.
                2.   Threat Target: It specifies the actual target of the attacker.
                3.   Risk: This is used to mention the priority based on the criticality of the risk.
                4.   Attack Techniques: These are the techniques that are used by the attackers to carry out the attack.

                5.   Attack Techniques: These are the techniques that are used by the attackers to carry out the attack.
                                  The tester  has detected two threats in the system which he/she has to
                                  document. The figure 7.8 shows the template that the tester uses to record the
                                  threat he/she  has detected. The template has five  rows which are threat
                                  description, threat target, risk, attack techniques, and counter measures.
                                               Figure 7.8: Template to Record Threat



































               Source: http://msdn.microsoft.com/en-us/library/aa302419.aspx



                                At this level the risk column is left empty since the risk ratings are given in next
                                level based on the criticality of the risk.









                                        LOVELY PROFESSIONAL UNIVERSITY                           99
   101   102   103   104   105   106   107   108   109   110   111