What are the different processes we follow for our securing application?


We can secure our application by performing the following tests:

a)Static Testing 

  • Analyses code at fixed points during its development.
  • Useful for developers to ensure the security is being maintained or not.


b) Dynamic testing

  • Analyses during executing.
  • More useful as it can stimulate attacks on production systems and reveal more complex patterns of systems.


c)Interactive testing

  • Combines elements of both static and dynamic testing.


d)Mobile testing 

  • Designed especially for mobile environments and can examine how others can leverage the mobile OS and apps running on that.

e) By testing the XSS, CSRF, SQL Injection method, by the developer itself by hiring a hacker.

Comments

Popular posts from this blog

Suppose that a data warehouse for Big-University consists of the following four dimensions: student, course, semester, and instructor, and two measures count and avg_grade. When at the lowest conceptual level (e.g., for a given student, course, semester, and instructor combination), the avg_grade measure stores the actual course grade of the student. At higher conceptual levels, avg_grade stores the average grade for the given combination. a) Draw a snowflake schema diagram for the data warehouse. b) Starting with the base cuboid [student, course, semester, instructor], what specific OLAP operations (e.g., roll-up from semester to year) should one perform in order to list the average grade of CS courses for each BigUniversity student. c) If each dimension has five levels (including all), such as “student < major < status < university < all”, how many cuboids will this cube contain (including the base and apex cuboids)?

Explain market-Oriented Cloud computing architecture.

Describe how cloud computing technology can be applied to support remote ECG monitoring.