Policies and regulations related to software security testing and the role of security testing

Safety test

1. Policies and regulations related to software security testing:

"Cyber ​​Security Law"

"Measures for the Security Review of Network Products and Services (Trial)"

"Government Information System Security Inspection Measures" (Guobanfa [2009] No. 28)

"Notice of the General Office of the State Council on Launching Network and Information Security Inspection Actions in Key Areas" (Guo Ban Han [2012] No. 102)

2. The value of software security testing services:

Software security testing is used to verify whether the protection mechanism integrated in the software can actually protect the system from illegal intrusion. In layman's terms: Of course, the security of a software system must be able to withstand frontal attacks - but it must also be able to withstand side and rear attacks in order to ensure the safe operation of the enterprise. The security inspection report avoids the security risks of the enterprise and ensures that the enterprise never fail.

3. What is software security?

Software security is an important subfield of the software domain. In the previous stand-alone era, the main security problem was that the operating system was prone to virus infection, and the safety of stand-alone application software was not prominent. However, since the popularization of the Internet, software security issues have become increasingly prominent, making the importance of software security testing rise to an unprecedented height.

Large Internet companies frequently have different system accidents——Xiaomi, Ctrip, NetEase, and 12306 have all been involved. Software performance security issues under the "Internet +" wave have received strong attention from inside and outside the industry.

4. Five functions of software security testing (user authentication security):

Can clearly distinguish different user permissions in the system

Can judge whether there will be user conflict in the software system

Can determine whether the system will cause confusion due to changes in user permissions.

Whether the user login password is visible and reproducible

Is it possible to log in to the system through the channel (copy the link after the user logs in and directly enter the system)

Tags: software security testing

Article source: Policies and regulations related to software security testing and the role of security testing-Chengdu Kexin Youchuang Information Technology Service Co., Ltd.

Guess you like

Origin blog.csdn.net/m0_64305922/article/details/132661667