Affiliation:
1. K.L.University, Guntur (Dt)
Abstract
Security testing involves two approaches; the question of who should do it has two answers. Standard testing organizations using a traditional approach can perform functional security testing. For example, ensuring that access control mechanisms work as advertised is a classic functional testing exercise. Systematic security testing approaches should be seamlessly incorporated into software engineering curricula and software development process. Traditional software engineering textbooks failed to provide adequate methods and techniques for students and software engineers to bring security engineering approaches to software development process generating secure software as well as correct software. This paper argues that a security testing phase should be added to software development process with systematic approach to generating and conducting destructive security test sets following a complete coverage principle. Software engineers must have formal training on writing secure code. The security testing tasks include penetrating and destructive tests that are different from functional testing tasks currently covered in software engineering textbooks Moreover, component-based development and formal methods could be useful to produce secure code, as well as automatic security checking tools. Some experience of applying security testing principles in our software engineering method teaching is reported.
Publisher
Trans Tech Publications, Ltd.
Reference15 articles.
1. Computer Emergency Response Team (CERT) Coordination Center, http: /www. cert. org/, August (2003).
2. Hao Chen and David Wagner, MOSPS: an Infrastructure for Examining Security Properties of Software, Proceedings of CCS'02, November 18 - 22, 2002, Washington, DC, USA.
3. Carlo Ghezzi, Mehdi Jazayeri, and Dino Mandrioli, Fundamentals of Software Engineering, Prentice Hall, (1991).
4. Frank Hayes, The Story So Far, ComputerWorld, Vol. 37, No 28, July 14, (2003).
5. John E. Hopcroft, Rajeev Motwani, and Jeffery D. Ullman, Introduction to Automata Theory, Languages, and Computation, 2nd edition, Addison Wesley, (2001).