What are the different processes we follow for our securing application?


We can secure our application by performing the following tests:

a)Static Testing 

  • Analyses code at fixed points during its development.
  • Useful for developers to ensure the security is being maintained or not.


b) Dynamic testing

  • Analyses during executing.
  • More useful as it can stimulate attacks on production systems and reveal more complex patterns of systems.


c)Interactive testing

  • Combines elements of both static and dynamic testing.


d)Mobile testing 

  • Designed especially for mobile environments and can examine how others can leverage the mobile OS and apps running on that.

e) By testing the XSS, CSRF, SQL Injection method, by the developer itself by hiring a hacker.

Comments

Popular posts from this blog

Suppose that a data warehouse consists of the four dimensions; date, spectator, location, and game, and the two measures, count and charge, where charge is the fee that a spectator pays when watching a game on a given date. Spectators may be students, adults, or seniors, with each category having its own charge rate. a) Draw a star schema diagram for the data b) Starting with the base cuboid [date; spectator; location; game], what specific OLAP operations should perform in order to list the total charge paid by student spectators at GM Place in 2004?

Define Business ethics . Explain its significance.

Short Note on Security Architecture of E-governance