Security testing Why it’s important



Software security testing is an imperative means to ensure software security then trustiness. This paper first generally discusses the definition and organization of software security testing why is important, and investigates methods and gears of software security testing extensively. Then it examines and concludes the advantages and difficulties of various methods and the scope of request, presents a taxonomy of security testing tools. Lastly, the paper points out upcoming focus and development instructions of software security testing knowledge.



With the wide usage of computer, software develops more complicated and large-scale, which also outcomes in more software security glitches increasingly. Software security is the aptitude of software to provide required function once it is attacked. There is growing anxiety about security testing, since it is regarded as an important incomes to recover security of software.

With the cyber world flattering more-and-more susceptible to attacks, security is something that cannot be compromised with. In instruction to develop safe applications, one really wants to use a security development lifecycle. Security necessity be considered and tested through the project lifecycle of any request.

Software security testing is the procedure to identify whether the security topographies of software implementation are reliable by the design. Software security testing can be alienated into security functional testing and security susceptibility testing. Security functional testing confirms whether software security functions are applied correctly and consistent with security supplies basing on security requirement specification. Software security supplies mainly include data confidentiality, honesty, availability, authentication, approval, access control, audit, privacy defense, security management, etc. Security vulnerability testing is to learn security vulnerabilities as an assailant. Vulnerability denotes to the flaws in system design, operation, operation, management. Susceptibility may be used to attack, resulting in a national of insecurity, Security susceptibility testing is to identify software security susceptibilities. In this paper, the current approaches, techniques and tools of security challenging are analyzed and abridged.

Thus security testing stage can be concatenated to the growth phase for increasing the honesty of the web applications. Goal of security testing is to notice those defects that could be exploited to behavior attacks [20]. Security testing assistances to emulate and expose susceptibilities like cross-site scripting, SQL injection, buffer excess, file inclusion, URL inoculation, cookie modification. Due to the huge increase in the web request vulnerabilities, there are numerous threats and challenges being confronted which can cause a severe hindrance to the integrity, confidentiality and safety of the web applications. So in order to devise any real methodology or techniques for web safety testing, we must first understand its unique challenges and subjects. The goalmouth of the paper is to discuss about numerous issues and challenges connected to the security testing.

Literature review

The rising of the Internet use has produced an enormous quantity of web applications, which have develop a preferred board for attacks. The difficulty and extensibility of Web applications brand these applications an easy quarry by exploiting software susceptibilities or defects. It is significant for all companies, in order to uphold their reputation and keep their products valued for users, to improve and safe their software.

For this aim, the new field Software Safety in Computer Science has learnt a significant importance. Now, there are a lot of research on the theme of Software Security with a wide diversity of topics such as stopping attacks, verifying security heights, and dynamic software informing.

The meaning of this paper is to deliver a literature review of the wide theme of Software Security. In the following units is defined what is Software Security and its alteration with Application Security (Section 2); in Section 3 is labelled how the software security should be applied through the software life cycle; an explanation of  Treat Demonstrating is exposed in Section 4; in Section 5 is labelled security issues concerned to E-commerce exact applications; in Section 6 is provided a account of the different kinds of Security Assessment Tools rummage-sale to assure security quality; and finally in Unit 7 is described a security nursing tool denominated Intrusion Detection Scheme.


Software Security

The new field Software Security complete its first formal appearance in books and moot classes in 2001. It is defined as the procedure of designing, structure, and testing software for security. Smearing Software Security best does, like including security errands in the software life cycle, classifying threats, and using tools to examine and test security, leads to safe software that are not only more dependable, but also less expensive to uphold since the cost of fixative the code to correct security fleabags will be minimum.


Software Security vs. Application security

A lot of people usually confuse the term Software Security by the term Application Security. The chief difference amid them is that Application Security is the procedure of protecting the software afterward it has been completed and organized by finding and fixing the security glitches after they have occurred, while Software security is the procedure of building a secure software by scheming, planning, coding and implementing captivating in consideration shared security threats.


Secure Software

It is important to comprehend that there is no way to assurance that software is 100% secured. The main idea behindhand Software Security is to mix the more level of security possible in software in instruction to diminish the potentials of an attack.

A lot of software growths do not provide proper security since they were created with wrong beliefs in mind such as that all users are friendly and determination not be perform an attack, that needful a password to login will stop unwanted users to try to drudge the application, and that a firewall is enough to defend a software from threats. There have been recognized several approaches often rummage-sale in software growth which do not provide a valid solution to security subjects in the final version of the product.

As it container be inferred, there is not a humble solution or task that can assurance the security of software once it is connected and in use. However, by applying a set of references and best practices it is possible to achieve satisfactory levels of security quality. Also, security should be integrated within the businesses’ strategies. In this case, the part of managers is to establish rules, measurable goals, support research and exercise that will situate security quality in a main position in software position. An significant strategy to apply in order to attain safe software is to include security errands within the software life cycle, which is labelled in the following section.

Security in the software development cycle


It is designated in a study performed through the Software Engineering Institute that greatest of the security issues in software are a importance of defects and poor quality in the growth process; this is a direct consequence that security is not being careful in the design of Web applications. When doings to secure software are only anticipated when problems arise afterward the application is finished, performing modifications to the request to fix the vulnerabilities is very problematic and expensive.

Most of the security glitches can be avoided is security is combined into the software life cycle, improving in this method the overall security excellence of the applications.

Threat Modeling

Threat modeling is clear as the engineering technique used to classify, to rate, to document and to organize all pertinent security risks, and weaknesses of an application. This tool lets developers to prepare the application to deal by the higher security risks that can happen. It also delivers a mechanism to create and understand a picture of the software architecture by determining the connectivity points, system mechanisms, and key security devices.

E-commerce Applications Security

The topics deliberated above can be applied to any type of requests, but there are certain specific security topographies that only concern to E-commerce requests. An E-commerce application lets buying or selling crops and services finished the Internet. This kind of transactions needs that the data transferred done the network must be highly endangered.

Applications Security Assessment Tools

An important aid in the procedure of examining Web application to discover security subjects are the Security Assessment Tools. These profitable and open-source tools allow us to control vulnerabilities through the dissimilar software life cycle stages. With that info, developers can prepare to create a additional robust application that will stop most of security attacks.

Intrusion Detection Systems

Another important tool to promise the software security quality after it is organized is the Intrusion Detection Systems. These gears monitor software applications and nets for possible security attacks attempts like illegal access, or abuse of privileges by users [10]. Interruption Detection Systems work as a defensive device by detecting suspicious activity and warning administrators of them.



Security testing can be a well-organized and cost-effective strategy to defend the organization’s systems against attacks.  If done correctly, it helps the organization identify the interior practices that give rise to weaknesses and other sources of vulnerabilities.  The recognized sources enable the organization to eliminate the vulnerabilities, properly direct the scheme’s security efforts, pressure vendors to recover their products, improve its internal commercial security practices and show to customers, stockholders and regulatory agencies that it is making a decent faith effort to properly defend critical business data.

Selecting a security side is a pertinent factor towards the achievement of security testing process.  In evaluating the side, consideration should be assumed to their qualifications, experience and information, reputation in the e-business public, access to, and use of, state of-the art gears.  A rule of thumb is to remove a team who provides the schemes to be tested.

Security testing cannot be predictable to identify all possible security susceptibilities since it is but just one feature of testing.  The organization must develop an overall security testing plan that is tailored to its threat replicas and security policies.

Finally, security testing must never be stared as a one-off-service.  It is conducted at a opinion of time.  System changes, threats arise, business strategies loan, and hacker tools evolve.    Fixing or repairing the vulnerability detected fixes not mean an end to your security doubts and nightmare, it is fair the beginning of a never ending cycle.  In adding, a penetration test does not offer any assurance of absolute security, it is just a dimension of security carriage.



Software Security is a wide topic which has become a central eye in the software development process. Principally in the emerging of Web applications due to them are additional expose to security attacks. It has been strong-minded that in order to obtain a tall level of security quality in Web applications it is essential to include good security practices throughout the whole software life cycle, and to brand use of the available security valuation and security monitoring tools that delivers to administrators, testers, and developers of appreciated information for creating secure applications.

In this paper describe security should be careful and tested throughout the application project lifespan, especially once the application deals with crucial info and data that is of great rank. Security testing is a process that verifies that the info system protects the data and upholds its intended functionality. It involves a lively analysis of the application for any faintness, technical flaws, or susceptibilities.  The primary purpose is to classify the vulnerabilities, and then repairs them.



[1] Security Testing of Web Applications: a Search Based Approach for Cross-Site Scripting Vulnerabilities, Andrea Avancini, Mariano Ceccato , 2011- 11th IEEE International Working Conference on Source Code Analysis and Manipulation.

[2] Special section on testing and security of Web systems Alessandro Marchetto. Published online: 14 October 2008 © Springer Verlag 2008

[3] Solving Some Modeling Challenges when Testing Rich Internet Applications for Security. Suryakant Choudhary1, Mustafa Emre Dincturk1, Gregor v. Bochmann1,3, Guy-Vincent Jourdan1,3 1EECS, University of Ottawa 3IBM Canada CAS Research. Iosif Viorel Onut, Paul Ionescu Research and Development, IBM. 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.

[4] McGraw, G. (2006). Software Security: Building Security In, Adison Wesley Professional.

[5] The Canadian Institute of Chartered Accountants Information Technology Advisory Committee, (2003) “Using an Ethical hacking Technique to Assess Information Security Risk”, Toronto Canada., accessed on Nov. 23, 2011.

[6] Mohanty, D. “Demystifying Penetration Testing HackingSpirits,”, accessed on Nov. 23, 2011.

[7] Antunes, N., Vieira, M.: detecting SQL Injection Vulnerabilities in WebServices. Dependable Computing, Latin-American Symposium on 0 (2009)17_24

[8] Antunes, N. & Vieira, M. 2014, “Penetration Testing for Web Services”, Computer, vol. 47, no. 2, pp. 30-36.

[9] AtefehTajpour, Suhaimi Ibrahim & Mohammad Sharifi 2012, “Web Application Security by SQL Injection DetectionTools”, International Journal of Computer Science Issues (IJCSI), vol. 9, no. 2, pp. 332-339.

[10] Antunes, N., Laranjeiro, N., Vieira, M., Madeira, H.: E_ective Detection of SQL/XPath Injection Vulnerabilities in Web Services. In: Proceedings of the 2009 IEEE International Conference on Services Computing. SCC’09, Washington, DC, USA, IEEE Computer Society (2009) 260_267.

[11], (2015).Protecting Web Applications and Users: ASD Australian Signals Directorate. [online] Available at: [Accessed 17 May 2015].

[12] Ben-Natan, R. 2005, Implementing Database Security and Auditing (5th Edition), Digital Press, Burlington.






Leave a Reply

Your email address will not be published. Required fields are marked *